Our documents are based on successfully executed projects which save you time and money.
Img (719) 315-0404
compliances , security

Oracle hardening considerations

March 9, 2012

Disable install and demo accounts Disallow default user/password PUBLIC has execute System privilege PUBLIC has execute Object privilege PUBLIC has execute UTL_FILE privilege PUBLIC has execute UTL_SMTP privilege PUBLIC has execute UTL_HTTP privilege PUBLIC has execute UTL_TCP privilege PUBLIC has execute DBMS_RANDOM Password complexity Restrict number of failed login...

Img
application , compliances , o-s , policies , security , web-services

IT Operations and Maintenance and NIST standards that apply

March 7, 2012

IT Operations and Maintenance Review Operational Readiness SP 800-70 SP 800-53A Perform Configuration Management SP 800-53A SP 800-100 Conducting Continuous Monitoring SP 800-53A SP 800-100 Conduct Re-Authorization SP 800-37 SP 800-53A Engineering and Development Controls SP 800-53 FIPS-200 www.bestitdocuments.com

Img
application , compliances , policies , security , web-services

Assessment descriptions and NIST standards that apply

March 7, 2012

Integrate Security into Established Environments SP 800-64 Certify System Security SP 800-37 SP 800-53A Test and Assess Security Controls SP 800-37 SP 800-53A Accredit System Security SP 800-37 Operation and Maintenance Readiness SP 800-70 SP 800-53A Perform Configuration Management SP 800-100 SP 800-53A Conduct Continuous Monitoring SP 800-100 SP...

Img
application , compliances , policies , security , web-services

SDLC Descriptions and NIST Standards that apply

March 6, 2012

SDLC Activity and supporting NIST publications NIST SP 800-64 Project Initiation – Security Planning SP 800-64 SP 800-100 SP 800-37 SP 800-53 Categorize Security for the System SP 800-60 FIPS-199 Assess Risk to a System SP 800-30 Analyze Risk Requirements SP 800-53 Assess Business Impact SP 800-34 Assess Policy...

Img
compliances , sample-it-spreadsheets , security

Sample Excel – NIST – Security Test Evaluation Report spreadsheet

March 3, 2012

Hopefully this is helpful to you.. We appreciate your comments and would greatly appreciate your backlinks… thank you ! Certificate & Accreditation and Security Assessment Mapping to NIST Standards. Free – Document download Security Test Evaluation Report spreadsheet www.bestitdocuments.com

Img
compliances , o-s , security

System Log Events that should be logged

March 2, 2012

Therefore, logs shall be created whenever any of the following activities are requested to be performed by the system: Create, read, update, or delete confidential information, including confidential authentication information such as passwords; Create, update, or delete information not covered in above (1); Initiate a network connection; Accept a...

Img
application , compliances , security

Compliance – Audit Reporting Requirements (SOX, HIPAA, GLBA and PCI)

March 2, 2012

SOX, HIPAA, GLBA and PCI requirements: SOX Audit Reports User Logons Sec 302(a)(4)(C) and 302(a)(4)(D) require user accesses to the system, be recorded and monitored for possible abuse. User Logoffs Sec 302(a)(4)(C) and 302(a)(4)(D) require user accesses to the system, be recorded and monitored for possible abuse. Logon Failures...

Img
compliances , security , visio-stencils , web-services

Sample Visio Can your Business Analyst build this?

February 27, 2012

We are guessing not…. otherwise you would not be looking for this drawing…. This is nothing compared to what we have flowed out. See our site at: www.bestitdocuments.com Free Visio document download Download here…

Img
networking , security

IPSO – Enable / Disable Voyager

February 27, 2012

To enable and disable the voyager please see below, To enable ipso[admin]#clish NokiaIP390:102> set voyager daemon-enable t NokiaIP390:103> save config NokiaIP390:104> exit To disable ipso[admin]#clish NokiaIP390:102> set voyager daemon-enable f NokiaIP390:103> save config NokiaIP390:104> exit

Img
compliances , security

PowerPoint – Healthcare 360 – Excellent

February 26, 2012

I downloaded this from somewhere and could not find the link otherwise I would reference the link. Free – Document download It’s a good resource you should look at.  Download here. www.bestitdocuments.com

Img
compliances , o-s , security

Windows Level Certification Checklist

February 23, 2012

Window policy information for Account Information [ ] List Groups and Their Users [ ] List Users and Their Groups [ ] List Users and Their Rights [ ] List Users With Admin Privilege [ ] List Locked Out Accounts [ ] List Disabled Accounts [ ] List Expired...

Img
compliances , security , visio-stencils

Visio Sample – Human Resouce (HR) Procedures Interaction mapping

February 23, 2012

If you need to ask you don’t need this sample drawing. Free – Visio Document download Procedures Interaction mapping

Img
compliances , o-s , security , visio-stencils

Sample Visio – Active Direcotry Architecture Sample

February 23, 2012

Free – Visio Document download AD Architecture sample www.bestitdocuments.com

Img
compliances , security , web-services

Web Administration Sample Titles and Roles

February 21, 2012

Overview Sample Web server (Content Providers) and administrative Roles and Responsibilities Due to the nature of the Web Administrators and Content Providers roles, they sometimes need guidance to assure there is no confusion as to who is ultimately responsible for each task associated with the creation and/or maintenance of...

Img
firewalls , security , visio-stencils

Sample Visio – Firewall Websense

February 20, 2012

High Level Firewall Websense System Configuration design. Free – Visio Document download Firewall Websense

Img
security

Sample – Desktop Computer Physical Security Considerations

February 20, 2012

Issue: Security of Computers and CPU cases and the prevention of memory (RAM) loss / theft. Recommendations: While no single method of securing a computer or other peripheral equipment is fool proof, the following procedures and products will, to varying degrees, prevent or discourage casual theft attempts. The more...

Img
business , networking , security

Business Service Management

February 18, 2012

Visual representation of the dependencies between business processes, business applications and the IT infrastructure. Reduced downtime and shorter problem resolution time because IT support focuses on solving the correct, high priority, business-relevant issues. Operational efficiency because operators can use a single console for viewing the status of business services...

Img
security , visio-stencils

Sample Visio – VIO Architecture Traffic Flows

February 18, 2012

Free – Visio Document download High Level – VIO Architecture Traffic Flows www.bestitdocuments.com

Img
security , visio-stencils

Sample Visio – Control System Safety Requirements drawing

February 18, 2012

Control Safety considerations. Free – Visio Document download Control System Safety Requirements drawing

Img
information-rights-management , itil , security , visio-stencils

Sample Visio – SharePoint, MOSS Collaboration Portal Design Example

February 17, 2012

Free Visio Document Download We are one of the best qualify / top documentation sites on the Internet and we hope you agree? This drawing represents what a site could look like from a business a technical perspective. You see flows,  interactions, grouping and dependencies. If we can flow...

Img
compliances , itil , networking , security , visio-stencils

Sample Visio – Simple ITIL Security Operations Workflows

February 17, 2012

Simple sample Security Operations Workflows and interactions. In order to create a good IT operations runbook. This is the level of details that should be flowed out and documented step for step. Free – Visio Document download Visio Work Flows

Img
compliances , security

Sample – EPHI (HIPAA) – Administrative Technical Controls

February 16, 2012

Thank you for your visit. If you like what you have found on our site please backlink our site and blog. Standards Sections Description Security Management Process  § 164.308(a)(1) Risk Analysis Risk Management Sanction Policy Information System Activity Review Assigned Security Responsibility § 164.308(a)(2) Workforce Security § 164.308(a)(3) Authorization...

Img
compliances , security

Anatomy of a Web Application

February 16, 2012

Without any protection, holes and backdoors exist at every layer waiting to be exploited Each layer of the application has its own unique vulnerabilities. A vulnerability fixed at one layer may still be exploited at another layer. An exploit at any layer of the application effects the integrity and...

Img
compliances , security

Sample – EPHI (HIPAA) – Physical Technical Controls

February 15, 2012

Thank you for your visit. If you like what you have found on our site please backlink our site and blog. Standards Sections Description Facility Access Controls § 164.310(a)(1) Contingency Operations Facility Security Plan Access Control and Validation Procedures Maintenance Records Workstation Use § 164.310(b) Workstation Security § 164.310(c)...

Img
compliances , security

Sample – EPHI (HIPAA) – Technical Security Controls

February 15, 2012

Thank you for your visit. If you like what you have found on our site please backlink our site and blog. Standards Sections Description Access Control § 164.312(a)(1) Unique User Identification Emergency Access Procedure Automatic Logoff Encryption and Decryption Audit Controls § 164.312(b) Integrity § 164.312(c)(1) Mechanism to Authenticate...

Img
compliances , security

Sample – Infrastructure: Operations Support Policy

February 15, 2012

Overview This policy defines the basic elements required for the Corporate Information Systems Operations Support.   Purpose To obtain reasonable assurance that computer operations activities provide scheduled, monitored, and secured processing as well as the timely identification of problems.  Scope The scope of this policy includes all personnel, including external...

Img
business , compliances , security

The Business Information Supply Chain

February 13, 2012

www.bestitdocuments.com

Img
compliances , security

HIPAA – Identitiy and Access Management SOC Dashboard Considerations

February 12, 2012

What a Security Operations Center IAM dashboard should present. Number of Requestable Products Average Request Processing Time New Rule Violations Employees by functional area Pending Requests Entitlement Assignments with / without requests Employees by status Pending Attestation Instances Number of Internal and External Employees Top 10 Departments (Members) www.bestitdocuments.com

Img
compliances , security

HIPAA – Identitiy and Access Management Considerations

February 12, 2012

Safeguard Standard Implementation Specification Technical Access Control Unique User Identification Automatic Log-off Audit Controls Person or entity Authentication Strong Authentication Physical Facility for access controls Physical Access Administration Security Management Process Risk Management Activity Review Workforce Security Termination Procedure Information Access Management Isolation Healthcare Clearing House Security Incident Procedures...

Img
application , compliances , security

What is Data Retention Compliance?

February 11, 2012

The ability to stipulate specific life cycle for different types of corporate IT documents. 1) Data usability and accessibility, the document must be in a useful form, e.g. viewable / reusable. The retrieval must meet the business process requirements. 2) Data security, the document must be held so as to...

Img
compliances , data-center-soc-noc , security

Security Operations – Security Guidance

February 10, 2012

Secure by Design Design for defense-in-depth Plan for security management Design system architecture for security Build network threat models Secure by Default Minimize the network attack surface Deny access by default Use security features in Windows Server 200x, Unix, MVS and Risc OS’s Secure in Deployment Software maintenance Security...

Img