Orange County NC Website
• Third-Party Risk Management <br /> <br />33. How does the cloud provider perform security testing, including logging, correlation, <br />intrusion detection, intrusion prevention, file integrity monitoring, time synchronization, <br />security assessments, penetration testing? <br />• Logging <br />• Correlation <br />• Intrusion Detection <br />• Intrusion Prevention <br />• File Integrity Monitoring <br />• Time Synchronization <br />• Security Assessments <br />• Penetration Testing <br />• Continuous Monitoring and Response <br />• Regulatory Compliance and Best Practices <br /> <br />34. What technologies and methods does the cloud vendor provide for strong authentication? <br />• Multi-Factor Authentication (MFA) <br />• Single Sign-On (SSO <br />• Social Sign-On <br />• IP Whitelisting <br />• Login Policies <br />• Device Recognition <br />• Session Management <br />• Password Policies <br />• Identity Connect <br />• Risk-Based Authentication <br /> <br />35. Provide any other comments and explanations: <br />Rehrig places a strong emphasis on security and compliance across its platform, and the <br />company is committed to continuously enhancing its security posture. Here are some <br />additional comments and explanations from Rehrig regarding their security measures, <br />best practices, and commitment to customer data protection <br /> <br />• Commitment to Security <br />• Transparency and Compliance <br />• User Education and Resources <br />• Incident Response and Reporting <br />Data Protection and Privacy <br />• Continuous Improvement <br />• Ecosystem Security <br />• Collaboration with Industry Partners <br /> <br /> <br />Docusign Envelope ID: 99306186-17FB-4EAC-9539-D90895EB6D04