Orange County NC Website
29. What methods does the cloud provider use to destroy information, when so authorized? <br />• Data Deletion on Request <br />• Secure Overwriting and Data Wiping <br />• Encryption Key Destruction <br />• Media and Hardware Sanitization <br />• Secure Data Backup Deletion <br />• Compliance with Legal and Regulatory Standards <br />• Third-Party Certifications and Audits <br /> <br />30. What is the cloud provider’s patch management policy/methods? <br />• Continuous Vulnerability Monitoring <br />• Patch Classification and Prioritization <br />• Automated Patch Deployment <br />• Testing in Sandbox and Staging Environments <br />• Scheduled Maintenance Windows <br />• Compliance with Security Standards <br />• Third-Party and Dependency Patching <br />• Real-Time Monitoring and Incident Response <br />• Customer Communication <br />31. How does the cloud provider defend against malware, including but not limited to <br />viruses, bots, spyware, spam, phishing and pharming? <br />• Network Security Controls <br />• Email Security Measures <br />• Endpoint Security <br />• Web Security <br />• User Awareness and Training <br />• Identity and Access Management (IAM) <br />• Threat Intelligence and Monitoring <br />• Malware Detection and Response <br />• Data Loss Prevention (DLP) <br />• Compliance and Best Practices <br /> <br />32. What system hardening strategies are employed by the cloud provider? <br />• Principle of Least Privilege <br />• Secure Configuration Management <br />• Regular Patching and Updates <br />• Network Segmentation and Isolation <br />• Firewalls and Intrusion Detection Systems (IDS) <br />• Data Encryption <br />• Multi-Factor Authentication (MFA) <br />• Application Security Testing <br />• Logging and Monitoring <br />• Security Awareness and Training <br />• Incident Response Plan <br />Docusign Envelope ID: 99306186-17FB-4EAC-9539-D90895EB6D04