Security Capabilities Orchestration Sample Clauses

Security Capabilities Orchestration. When obtaining specific information within the PALANTIR platform, the following subcomponents inside SCO are expected to interact with several PALANTIR components. SO interacts, actively or passively, with: • The Trust, Attestation & Recovery component, in charge of performing periodic attestation of different hardware and software nodes to identify possible untrusted states. On the one hand, the SO provides TAR with specific infrastructure details (such as the container ID or the container’s image ID related to a specific SC instance) so that the AE subcomponent can operate on these infrastructure virtual resources. It also notifies AE of the instantiation of any new SC instance (also understood as “new node registration”). On the other hand, the TAR component transmits requests to either spin up a new SC on the network or to configure an already running one. The orchestrator is also polled by the recovery service subcomponent to assess any malfunction in a SC instance, and initiate remediation measures if needed. • The dashboards, accessible through the PALANTIR Portal and able to show cybersecurity alerts, the status of the running services and other information. • The Service Matching associates instance information from the Security Orchestrator monitoring subsystem to identify how service level agreements are respected and determine the billing information. SCC interacts with: • The Accounting and Security dashboards, accessible through the PALANTIR Portal: the Portal can also be used to provide access to the SCC, based on the user account’s role, to expose a set of UIs for PALANTIR with, among others, features related to the catalogue. The user account control is basically part of this component, and the SCC uses it as well. • The Risk Analysis Framework component: the security/privacy threats are identified based on impact assessment and its correlation with attack surface analysis. The overall risk is to be tracked and managed in a dynamic scenario where threat intelligence is updated. Such information should be useful for the SCC, to obtain the suitability of a service and the way it can minimise risk by being deployed on the network in each case, thus creating recommendations for service deployment, and sorting the catalogue of services according to each user’s needs. • The Service Matching component: selecting which security capability should be deployed requires accessing the technical specification of those available for deployment. To that e...
AutoNDA by SimpleDocs

Related to Security Capabilities Orchestration

  • Security Cameras Security cameras have been installed throughout the Facility; however, they will not routinely be used in areas where there is an expectation of privacy, such as restrooms or patient care areas.

  • Financial Management System Subrecipient shall establish and maintain a sound financial management system, based upon generally accepted accounting principles. Contractor’s system shall provide fiscal control and accounting procedures that will include the following:

  • Patch Management All workstations, laptops and other systems that process and/or 20 store PHI COUNTY discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or 21 transmits on behalf of COUNTY must have critical security patches applied, with system reboot if 22 necessary. There must be a documented patch management process which determines installation 23 timeframe based on risk assessment and vendor recommendations. At a maximum, all applicable 24 patches must be installed within thirty (30) calendar or business days of vendor release. Applications 25 and systems that cannot be patched due to operational reasons must have compensatory controls 26 implemented to minimize risk, where possible.

  • Financial Monitoring City staff shall monitor, review, and evaluate the financial procedures of the Subrecipient through documents submitted to the City and on-site monitoring. The Subrecipient shall provide and make available to the City such reports and records that will be necessary for a proper financial evaluation. With reasonable notice being given to the Subrecipient, the City may schedule at least one on-site visit and other visits that may be needed during the course of this Agreement.

  • Security Management The Contractor shall comply with the requirements of the DOD 5200.1-M and the DD Form 254. Security of the Contractor’s electronic media shall be in accordance with the above documents. Effective Program Security shall require the Contractor to address Information Security and Operations Security enabled by the Security Classification Guides. The Contractor’s facility must be able to handle and store material up to the Classification Level as referenced in Attachment J-01, DD Form 254.

  • FINANCIAL MANAGEMENT AND OVERSIGHT Measure 2a Is the school meeting financial reporting and compliance requirements?

  • Operator’s Security Contact Information Xxxxxxx X. Xxxxxxx Named Security Contact xxxxxxxx@xxxxxxxxx.xxx Email of Security Contact (000) 000-0000 Phone Number of Security Contact

  • RESPONSIBILITIES OF THE DEPARTMENT The Department agrees to:

  • Financial Management Services ‌ Definition: Financial Management Services includes the planning, directing, monitoring, organizing, and controlling of the monetary resources of an organization. Examples: Service areas that are included under the Financial Management Services discipline include, but are not limited to the following:

  • Financial Management (a) The Recipient shall ensure that a financial management system is maintained in accordance with the provisions of Section 2.09 of the Standard Conditions.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!