Laserfiche WebLink
Security Policies and Procedures <br />B. Policy <br />Sufficient information is available for proper investigation of use, misuse, incidents <br />and performance <br />User ID, event type, date and time are maintained <br />Time is according to a known time stamp so that events across systems can be <br />coordinated <br />4. End -to -end accountability is always maintained <br />Changes to operating systems, application code or other tools <br />Backup and restore events <br />Changes affecting any cryptographic keys or devices <br />Stop or start of critical processes <br />Transaction failure, retry or duplication <br />KissMetrics <br />Segment.io <br />Sendgrid <br />XX. Encryption <br />Preface <br />Application Encryption Policy <br />Key Rotation Policy <br />D. Device Encryption Policy <br />Mac OS Devices: <br />Windows OS Devices: <br />Linux OS Devices <br />Android Devices <br />Windows Phone <br />iPhone <br />E. Wi-Fi network encryption <br />F. Email encryption <br />G. Enforcement <br />XXI. Assessments and Testing <br />Overview <br />B. Penetration testing <br />Operating systems <br />Applications <br />Databases <br />C. Vulnerability assessment testing <br />A new system, application or network is installed inside the Company <br />Changes are made to firewalls. VPNs or other security control tools <br />Changes are made to a web server's operating system <br />Changes are made to email servers <br />Configuration changes are made to databases <br />Rev.2015.8.6 <br />