Orange County NC Website
physically connected to networking equipment with non-County data? <br />There is no point in the architectural structure where the county app would be connected <br />to any data that does not belong to the county. <br /> <br />22. What are the cloud provider’s information security policies? <br />See attached Vetpro-SecurityArchitecturePolicy.pdf. <br /> <br />23. What are the cloud provider’s incident management and reporting policies? <br />See attached VetPro-SecurityIncidentResponse.pdf. <br /> <br />24. What is the process by which the cloud provider updates policies and informs customers? <br />A review of our documentation is done annually, and updates are made when changes <br />occur. Customers are notified according to their individual requirements stipulated in <br />their contracts. <br /> <br />25. What is the basic architecture of the cloud provider’s network security? (overall design, <br />zones, filters, firewalls, VLANs, protocols, standards) <br />See attached VetPro-InfrastructureDiagram.png. <br /> <br />26. What security measures does the cloud provider use in data storage, transit and use? <br />See attached VetPro-SecurityArchitecturePolicy.pdf. <br /> <br />27. What encryption technologies does the cloud provider use in data management? <br />See attached VetPro-EncryptionPolicy.pdf. <br /> <br />28. How are access rights managed by the cloud provider for their employees, contractors <br />and other persons? <br />See attached VetPro-UserAccountAdministration.pdf. <br /> <br />29. What methods does the cloud provider use to destroy information, when so authorized? <br />See attached VetPro-DataRetentionPolicy.pdf. <br /> <br />30. What is the cloud provider’s patch management policy/methods? <br />We manage the patching and service packs for our servers using AWS Systems Manager. <br />Updates are pushed out to our servers during evening hours, as needed. One of our <br />trained professionals reviews our servers once a month to ensure software is up to date. <br />31. How does the cloud provider defend against malware, including but not limited to <br />viruses, bots, spyware, spam, phishing and pharming? <br />See attached VetPro-ApplicationSecurityPolicy.pdf. <br /> <br />32. What system hardening strategies are employed by the cloud provider? <br />See attached VetPro-ApplicationSecurityPolicy.pdf. <br /> <br />33. How does the cloud provider perform security testing, including logging, correlation, <br />intrusion detection, intrusion prevention, file integrity monitoring, time synchronization, <br />security assessments, penetration testing? <br />Docusign Envelope ID: 55C10F80-889A-4F10-9C76-7F6DB067F1FE