The ENCON Group Inc
Total Page:16
File Type:pdf, Size:1020Kb
ENCON Group Inc. 500-1400 Blair Place Ottawa, Ontario K1J 9B8 Telephone 613-786-2000 Facsimile 613-786-2001 Toll Free 800-267-6684 www.encon.ca Application Addendum Information Technology Security
The purpose of this questionnaire is to establish what security measures are in place to prevent hardware/software/network losses. Maintaining continuity of services is the primary risk exposure. Situations that can cause an interruption of business are unauthorized intrusion (hackers), fire, power shortage, software/hardware failure, etc.
1. Name of Applicant:
2. Internet Access Providers (ISP) Web Hosting Application Service Providers (ASP) Storage Service Providers (SSP)
3. Do you have a contingency plan? YES NO
If yes, please provide a copy.
If no, please provide details of your alternative measures.
PREMISES SECURITY
4. Building details:
5. Do you have card access control to: Building Office Server Rooms None
6. Do you have a dedicated line alarm system? YES NO
7. Do you have fire suppression system with capability to suppress fire without damaging electrical equipment? YES NO
8. Do you have early smoke detection system? YES NO
9. Do you have a sprinkler system? YES NO
10. Do you have controlled air ventilation system to prevent overheating in the server room? YES NO
11. Do you have windows/doors protection against breakage and entry? YES NO
12. Do you have visits logged against customer defined control lists to allow /deny access to servers and systems? YES NO
13. Do you have an uninterruptible power supply? YES NO
If yes, how long can it sustain a power interruption?
IT33E-SRD-01-SECURITY 1 Nov. 3/03 © 2003 ENCON Group Inc. NETWORK DATA
14. Confirm what security controls are used to safeguard communications networks and data integrity, accuracy and completeness.
15. Are the servers monitored 24 hours/day? YES NO
16. Do you have any intrusion detection system to monitor external traffic and server logs for any possible hack attempts of known vulnerabilities and capture perpetrator’s traffic for further analysis? YES NO
17. Do you have a firewall and router logged for successful and unsuccessful connections and are they backed up on a daily basis? YES NO
(a) Are all log files indicating allowed and denied access, as well as possible security penetration attempts from firewall and IDS monitored routinely and regularly throughout each day? YES NO
(b) Does your router include packet filtering and access control lists? YES NO
(c) Do you have a policy in place for installing service release patches and hot fixes? YES NO
If yes, how often?
18. Are all servers, data, applications and logs backed up to tape, with rotating copies stored off site? YES NO
If yes, how often? Daily Weekly Monthly None
19. To minimize downtime due to software or hardware breakdown, do you utilize server and component redundancy? YES NO
20. To minimize downtime due to software or hardware breakdown, do you utilize co-location server? YES NO If yes, please provide details.
21. Do you have any documented procedures in place for the following: (a) systems recovery YES NO (b) intrusion detection YES NO (c) firewall service release patches and hot fixes YES NO (d) daily back-ups YES NO
22. Do you have virus detection software? YES NO
If yes, how often do you update the software? Daily Weekly Monthly
23. Is your data mirrored for data integrity? YES NO
Signature Date
Position
IT33E-SRD-01-SECURITY 2 Nov. 3/03 © 2003 ENCON Group Inc.