Browse
Search
2024-720-E-Solid Waste-Rehrig Vision Software-Vision web based cart system
OrangeCountyNC
>
Board of County Commissioners
>
Contracts and Agreements
>
General Contracts and Agreements
>
2020's
>
2024
>
2024-720-E-Solid Waste-Rehrig Vision Software-Vision web based cart system
Metadata
Thumbnails
Annotations
Entry Properties
Last modified
11/21/2024 3:17:23 PM
Creation date
11/21/2024 3:17:03 PM
Metadata
Fields
Template:
Contract
Date
10/21/2024
Contract Starting Date
10/21/2024
Contract Ending Date
11/21/2024
Contract Document Type
Contract
Amount
$56,700.00
There are no annotations on this page.
Document management portal powered by Laserfiche WebLink 9 © 1998-2015
Laserfiche.
All rights reserved.
/
39
PDF
Print
Pages to print
Enter page numbers and/or page ranges separated by commas. For example, 1,3,5-12.
After downloading, print the document using a PDF reader (e.g. Adobe Reader).
View images
View plain text
• Identity and Access Management (IAM) <br />• Monitoring, Logging, and Security Information and Event Management (SIEM) <br />• DDoS Mitigation <br />• Physical Security Controls <br />• Compliance and Regular Security Audits <br /> <br />26. What security measures does the cloud provider use in data storage, transit and use? <br />• Data Storage Security <br />o Encryption at Rest <br />o Access Control and Role-Based Access <br />o Redundant Storage and Replication <br />o Audit Logging <br />o Regular Security Patching <br /> <br />27. What encryption technologies does the cloud provider use in data management? <br />• Encryption at Rest <br />o Advanced Encryption Standard (AES-256) <br />o Shield Platform Encryption <br />o Customer-Managed Keys <br />• Encryption in Transit <br />o Transport Layer Security (TLS 1.2/1.3) <br />o HTTPS and Secure APIs <br />• Encryption Key Management <br />o Hardware Security Module (HSM) <br />o Key Rotation and Revocation <br />• Encryption in Use <br />o Field-Level Encryption\ <br />o Tokenization and Masking <br />• Compliance-Oriented Encryption Standards <br />o FIPS 140-2 Compliance <br /> <br />28. How are access rights managed by the cloud provider for their employees, contractors <br />and other persons? <br />• Role-Based Access Control (RBAC) <br />• Principle of Least Privilege <br />• Multi-Factor Authentication (MFA) <br />• Single Sign-On (SSO) Integration <br />• Access Reviews and Audits <br />• Strict Access Approval and Revocation Processes <br />• Privileged Access Management (PAM) <br />• Data Masking and Restricted Access in Production Environments <br />• Activity Monitoring and Logging <br />• Training and Security Awareness <br /> <br /> <br />Docusign Envelope ID: 99306186-17FB-4EAC-9539-D90895EB6D04
The URL can be used to link to this page
Your browser does not support the video tag.