Orange County NC Website
<br />26. What security measures does the cloud provider use in data storage, transit and use? <br />Click here to enter text. <br /> <br />27. What encryption technologies does the cloud provider use in data management? <br />Click here to enter text. <br /> <br />28. How are access rights managed by the cloud provider for their employees, contractors <br />and other persons? <br />Click here to enter text. <br /> <br />29. What methods does the cloud provider use to destroy information, when so authorized? <br />Click here to enter text. <br /> <br />30. What is the cloud provider’s patch management policy/methods? <br />Click here to enter text. <br /> <br />31. How does the cloud provider defend against malware, including but not limited to <br />viruses, bots, spyware, spam, phishing and pharming? <br />Click here to enter text. <br /> <br />32. What system hardening strategies are employed by the cloud provider? <br />Click here to enter text. <br /> <br />33. How does the cloud provider perform security testing, including logging, correlation, <br />intrusion detection, intrusion prevention, file integrity monitoring, time synchronization, <br />security assessments, penetration testing? <br />Click here to enter text. <br /> <br />34. What technologies and methods does the cloud vendor provide for strong authentication? <br />Click here to enter text. <br /> <br />35. Provide any other comments and explanations: <br />Click here to enter text. <br />Docusign Envelope ID: D749BDBA-7901-49B9-B6FC-5183B99A1A05