4.2.8 TECHNICAL ENVIRONMENT

IdMS Operations must be managed to resist various potential threats such as unauthorized intrusions and service disruptions that might result in false Assertions of Identity or other erroneous communications.

4.2.8.1  SOFTWARE MAINTENANCE

IdMS systems are maintained with software versions that are current and are patched on a monthly schedule with critical security patches applied within two weeks of release.

4.2.8.2  NETWORK SECURITY

1.  We have an intrusion detection and preventions system at the network border.  All systems communicate through secure channels.

2.  All personnel with login access to IdMS systems use credentials with Silver or higher strength.

4.2.8.3  PHYSICAL SECURITY

All IdMS systems are physically located within one of our two secure data centers.  [details are sensitive]

4.2.8.4  RELIABLE OPERATIONS

Our IdMS systems are configured in load balanced clusters for redundancy.  [prevention of false assertions???]

  • No labels