Security Planning definition

Security Planning system security planning process starts with identifying the project risks related to non‐compliance and the risk of data breach. Security Development: system security development includes security requirements that are outlined in the Cloud Solutions Requirements. There are three types of safeguards: Administrative: relate to the documented policies and procedures related to day‐to‐day activities and operations. Physical: adopted measures for protecting the Department’s information systems and confidential information from environmental hazards and unauthorized intrusion. Technical: adopted security measures for using technology to protect the data gathering, storing, and transmitting between the Participating Entity and the Quest Pondera team. Pondera has strict administrative, technical, and physical controls in place to protect clients’ data. The facility is hosted by Quest Technology Management and is ANSI TIA‐942 tier 3 data center or higher for architectural, electrical, and mechanical requirements. Physical access to the infrastructure is controlled by multiple layers of access controls including proximity card access, biometrics, and physical cages. The client’s data is stored on an AES 256 bit encrypted data store. Each client’s infrastructure is isolated to a unique dedicated private vLAN, dedicated virtual infrastructure and monitored by an IDS system. The infrastructure is built upon a high availability architectural configuration using a VMware hosts and a central redundant Storage Area Network (SAN). FDaaS does not have an interface with the open Internet. Clients access FDaaS through a Lan 2 Lan VPN (L2L‐VPN through IPSec) and a web browser over secure HTTP (HTTPS channel). This creates a dual secure channels at both the application and network layers. Client’s native data is transported to the FDaaS data stores via secure FTP (sFTP) over the encrypted L2L‐VPN which also creates dual secure channels at both the application and network layers. Data backups and/or snapshots and frequency are available based on data owner’s requirements. At the conclusion of the contract or based on client’s data retention/disposal requirements, Quest/Pondera would ensure data is appropriately destroyed. Data destruction is specific to the storage requirements of the client and can take one of the following forms: • Disposal of the encryption keys. • Force overwrite of the area on disk in which data resides. • Physical destruction of storage media including bu...

Examples of Security Planning in a sentence

  • Cyber Security Planning will be an On-Going Program, for which the Contractor shall provide an annual revision of the Cyber Security Plan and at least quarterly updates.

  • Chief Security Architect This role is responsible for the Information Security Management and Risk Management Framework practices, including the On-Going Program of Security Planning.

  • Cyber Security Planning Which provides that the security plan for the EITS Environment is executed and updated at least annually, and as described under section 5.3.8 Information Security Management, and in the SMM.

  • A key recommendation from the project is to set up a European House of Security Planning for Major Events, which would serve as a knowledge repository and mechanism for promoting ongoing cooperation.

  • The Region 3 Homeland Security Planning Board should consider the benefits to Region 3 prior to approving projects for funding.

  • TMP shall include the Premises in its Security Planning ----------------- and guard posting for the purpose of securing the safety and welfare of MRFT's employees as well as the properties of MRFT located within the premises of the TMP.

  • Copy or distribute any part of the Site or the Services, except where expressly authorized by BlueCheck.

  • Cyber Security Planning Which provides that the Cyber Security Plan for the EITS Environment is executed and updated at least annually, and as described under section 5.3.8 Information Security Management, and in the SMM.

  • Chief Security Architect This role is responsible for the Information Security Management and Risk Management practices, including the On-Going Program of Security Planning.

  • The planning regions for the purpose of the FY2017 SHSP grant will be the eight (8) Ohio Homeland Security Planning Regions.

Related to Security Planning

  • Security Plan means the Contractor’s security plan prepared pursuant to paragraph 3 of Schedule (Security Requirements & Plan)

  • Discharge planning means the formal process for determining, prior to discharge from a facility, the coordination and management of the care that a patient receives following discharge from a facility.

  • Security Services means, a systemic approach to managing an organisation’s security needs as per specifications, terms and conditions stipulated under the contract, the organisation in this case refers to Medical Colleges/ Hospitals

  • Security Management Plan means the Supplier's security management plan prepared pursuant to paragraph 3 of schedule 2 an outline of which is set out in paragraph 2.7 of the Order Form as updated from time to time;

  • Health planning region means a contiguous geographical area of the Commonwealth with a