Browse
Search
2024-720-E-Solid Waste-Rehrig Vision Software-Vision web based cart system
OrangeCountyNC
>
Board of County Commissioners
>
Contracts and Agreements
>
General Contracts and Agreements
>
2020's
>
2024
>
2024-720-E-Solid Waste-Rehrig Vision Software-Vision web based cart system
Metadata
Thumbnails
Annotations
Entry Properties
Last modified
11/21/2024 3:17:23 PM
Creation date
11/21/2024 3:17:03 PM
Metadata
Fields
Template:
Contract
Date
10/21/2024
Contract Starting Date
10/21/2024
Contract Ending Date
11/21/2024
Contract Document Type
Contract
Amount
$56,700.00
There are no annotations on this page.
Document management portal powered by Laserfiche WebLink 9 © 1998-2015
Laserfiche.
All rights reserved.
/
39
PDF
Print
Pages to print
Enter page numbers and/or page ranges separated by commas. For example, 1,3,5-12.
After downloading, print the document using a PDF reader (e.g. Adobe Reader).
View images
View plain text
29. What methods does the cloud provider use to destroy information, when so authorized? <br />• Data Deletion on Request <br />• Secure Overwriting and Data Wiping <br />• Encryption Key Destruction <br />• Media and Hardware Sanitization <br />• Secure Data Backup Deletion <br />• Compliance with Legal and Regulatory Standards <br />• Third-Party Certifications and Audits <br /> <br />30. What is the cloud provider’s patch management policy/methods? <br />• Continuous Vulnerability Monitoring <br />• Patch Classification and Prioritization <br />• Automated Patch Deployment <br />• Testing in Sandbox and Staging Environments <br />• Scheduled Maintenance Windows <br />• Compliance with Security Standards <br />• Third-Party and Dependency Patching <br />• Real-Time Monitoring and Incident Response <br />• Customer Communication <br />31. How does the cloud provider defend against malware, including but not limited to <br />viruses, bots, spyware, spam, phishing and pharming? <br />• Network Security Controls <br />• Email Security Measures <br />• Endpoint Security <br />• Web Security <br />• User Awareness and Training <br />• Identity and Access Management (IAM) <br />• Threat Intelligence and Monitoring <br />• Malware Detection and Response <br />• Data Loss Prevention (DLP) <br />• Compliance and Best Practices <br /> <br />32. What system hardening strategies are employed by the cloud provider? <br />• Principle of Least Privilege <br />• Secure Configuration Management <br />• Regular Patching and Updates <br />• Network Segmentation and Isolation <br />• Firewalls and Intrusion Detection Systems (IDS) <br />• Data Encryption <br />• Multi-Factor Authentication (MFA) <br />• Application Security Testing <br />• Logging and Monitoring <br />• Security Awareness and Training <br />• Incident Response Plan <br />Docusign Envelope ID: 99306186-17FB-4EAC-9539-D90895EB6D04
The URL can be used to link to this page
Your browser does not support the video tag.