Our documents are based on successfully executed projects which save you time and money.
Img (719) 315-0404
o-s , security

RIS Basic Desktop Framework

March 17, 2010

Purpose of this document: This standard desktop documentation is used in order to keep an on-going record of the software, hardware, and certified non standard software changes made to the IT Desktop Services.  Remote Installation Services Templates Desktop Images Image-name Dell with Windows 7 / Office 2007 Image-name Dell...

Img
compliances , information-rights-management , security

Document Sets and Strategies that you should consider for your Organization

March 17, 2010

All security domains integrated strategy All security domains strategy documentReview of all security domains integrated security documentManagement commitment to information securityManagement commitment to securitySupporting security philosophy & valuesSecurity a business enablerSecurity integrated across all business functionsAll security domains security program design Domains security program design All security domains program...

Img
business , information-rights-management , networking , security

Protocol Overviews

March 16, 2010

A number of different protocols exist that each satisfies the key characteristics of a VPN. The most commonly recognized protocols are: SOCKS SSL · SSL (Secure Sockets Layer), working only with TCP/IP protocols is the primary protocol for secure connections to web servers, requiring a valid site certificate issued from...

Img
business , compliances , information-rights-management , security

Sample Access & Authentication Scope

March 16, 2010

A high-level outline was developed with input from the each discipline.  The outline centers on the ability to identify data classifications and the assignment of access controls. The documents that will be generated are: 1.  Summary document in outline form 2.  Authentication and Access Control Strategy 3.  Network Access...

Img
compliances , policies , security

Sample Modem Security Policy

March 16, 2010

Executive Summary Policies are management instructions indicating how an organization is to be run. This policy is designed to be an addition to an existing corporate security policy. It can be an addition to a Remote Access Policy, if one exists, or to simply stand alone as a Modem...

Img
information-rights-management , security , sharepoint

Certification and Accreditation Document Support Spectrum

March 15, 2010

The required C&A documentation includes the following: · An independent Risk Assessment (including final written report) compliant with NIST Special Publication 800-30, draft Risk Management for Information Technology Systems, and conforming to the Department Information Technology Security Risk Assessment Guide, including the Risk Assessment Template included in the Guide. ...

Img
business , compliances , security

HIPAA Defense in depth

March 15, 2010

HIPAA Compliance: Section                              Standard                                                      Specification 164.308(a)(1)              Security Management Process            Risk Management 164.308(a)(5)              Security Awareness Training              Log-in Monitoring 164.308(a)(6)              Security Incident Procedures              Response and Reporting 164.312(b)                   Audit Controls                                                Encryption and Decryption 164.312©(1)                Integrity                                              Mechanism automating PHI Scope: Data Applications Servers Subnets DPA policy control Network Requirements: 1) Triple factor Authentication 2) Access...

Img
security

Sample Consulting Insurance Requirements

March 14, 2010

Always seek proper legal advise for your organization. These pages provide an explanation and example of corporate’s minimum insurance requirements. During the term of an agreement and without cost to corporate, suppliers are required to maintain and ensure that their subcontractors maintain the following insurance coverage with reputable insurance...

Img
compliances , security

Common Medical Applications – Information

March 14, 2010

  Common Medical Apps – Info Vendor Name Mainframe (MF), Mini (MN), Micro (MC) Application Software In-House Workstation (WS) Accounts Receivable HBOC MF Accounts Payable GEAC (AP:M) MF Acuity (Patient Classification) Medicus MF/MC Biomedical Equipment Maintenance In-House MF Blood Bank/Pathnet Cerner MN Cardiology Seattle WS Case Mix Management TSI...

Img
business , compliances , security

Healthcare Industry Segmentation

March 14, 2010

Healthcare Payers National Health Insurance Plans Federal Government (CMS – Medicare) State Government (DHHS – Medicaid) Healthcare Providers Hospitals Long-Term Care Facilities Physician Medical Practices Specialty Care Providers (Outpatient, Oncology, etc) Affiliated Organizations Clearinghouses, Third Party Administrators, etc. Key Business Drivers The revenue source of a hospital is driven...

Img
o-s , security

Which User Files on your Windows 200x Workstation Should Be Backed Up?

March 13, 2010

Introduction: All PC users are provided with a hard drive in order to store their local data. To assure that important information is not lost in the event disk drive disaster, each person must establish a strategy to back up their own data. “Back up” is the process used...

Img
o-s , security

Startup Apps and Windows 2000-based Services

March 13, 2010

Excellent reference – Searchable, comprehensive list of the programs you may find that run when you switch on your PC: http://www.pacs-portal.co.uk/startup_content.php#THE_PROGRAMS – Full-list ZIP Windows 2000 startup services   Service Full Name Default Alerter  Alerter  Automatic  AppMgmt  Application Management  Manual  ClipSrv  ClipBook  Manual  EventSystem  COM+ Event System  Manual  Browser ...

Img
o-s , security

Assets

March 13, 2010

An asset is anything that has some value to an organization. Asset Identification • It is necessary to determine the assets that need protection, their value, and level of protection required • Two Types: » Tangible » Intangible Tangible Assets • Tangible assets are physical • Examples: » Personnel » Offices, workspaces, warehouses, etc. » Inventory, stores,...

Img
security

Fine-Grained Access Controls

March 13, 2010

Implement Security Policy · Create rules to enforce access control policy · Control ports, protocols, and direction · Implement policy schedule based on operational needs • Limit exposure to application vulnerabilities • Dynamically open and close networking ports · Provide Forensic Information • Monitor and log all network connections · Provide In-Line Protection • React and intervene...

Img
compliances , information-rights-management , security

Consderations for Securing your environment

March 13, 2010

Identify Access Points In the electronically open organization… • Who has access to your internal network? – Employees in the office or remote, using VPNs – Contractors, consultants, temporary workers – Customers, suppliers, and partners via extranet – Outsiders who have penetrated the perimeter • Operations and resources are becoming more distributed –...

Img
o-s , security

How to Stop and Restart the Ace Service on the RSA Service

March 13, 2010

Analysis:             On the RSA Server do:                         ps – ef | greg ace  (lower-case)  – check to see if the ace process is running if not su –             su – ace   “provide password” To start from scratch (note the order):         /var/ace/prog/aceserver stop        1st (stops the ACE...

Img
application , security

Sample Directory Services Consolidation Project

March 12, 2010

Directory Services is an integral component of the solutions an enterprise data center should offer its clients.  It is advisable to initiate a project to migrate and consolidate the Corporate departments, existing directory services, including Windows, Netware, and any others.  It is recommended to consolidate all directory services to...

Img
application , security , web-services

Sample – Shared Application Development and Testing Environment Project

March 12, 2010

The availability of a shared application development and testing environment will provide agencies parallel production-like environments without having to maintain and purchase equipment for the department sites. Multiple standard environments can quickly be provisioned into a server partition in less than 15 minutes (based on predefined server builds and the...

Img
networking , security

Download Sample External Vulnerability Assessment

March 12, 2010

External Vulnerability Assessment https://www.bestitdocuments.com/Samples

Img
compliances , security

Regulation Impact by IT Technology Domains

March 11, 2010

Sarbanes Oxley Act HIPAA Gramm-Leach-Bliley Act SEC 17a-4 and NASD and NASD Financial compliance, business process measurement applications X Enterprise resource planning X Business intelligence and data warehousing X Content/document  management and search X X X X Data/application integration X Business process automation X X Records management and email...

Img
networking , security

Suggested Perimeter Network TCP/IP Filters

March 11, 2010

Carefully consider which TCP/IP services will be allowed through and to the perimeter routers and firewalls (inbound and outbound). Use the following guidelines for creating filters:  those services that are not explicitly permitted are prohibited.  The following tables present common services to restrict because they can be used to...

Img
compliances , networking , sample-it-spreadsheets , security

Sample Architectural Key Components Planning Document

March 11, 2010

Introduction Technology Component Name: Initiator: Problem/Opportunity Definition This is the problem or opportunity that caused the inception of the project. Business Drivers This section contains any business drivers that are associated with this component (if applicable). High Level Business Requirements This section provides the “what” of the business need....

Img
networking , security

Network Fault Management Description

March 11, 2010

Faults can be defined as any failure or outage in the network.  These can be system or service related and often times are masked as a downstream product of a combination of the two.  Proactive fault analysis is an essential component of network management deployment. The same type of...

Img
compliances , security , visio-stencils

Sample Visio – MIL-STD-100 and DOD-STD-1000

March 11, 2010

Free Visio Document download MIL-STD100_Sample.vsd The MIL-STD-100 and DOD-STD-1000 standards suck, they are vague and generally interpretive and un-atainable. Below are some recommendations for at least good guidelines. Items necessary for good network documentation Identification of servers, workstations, printers, routers, switches, etc. IP addresses NetBIOS/Host names MAC addresses Description...

Img
networking , security

VLAN Security Test

March 11, 2010

Intrusion Detection FAQ: Are there Vulnerabilites in VLAN Implementations? VLAN Security Test Report http://www.sans.org/security-resources/idfaq/vlan.php  

Img
networking , security

Sample VLAN Project Charter

March 11, 2010

  Sample VLAN Project Charter Implement a Virtual Local Area Network Solution Project Overview Business Case Background and Rationale for the project As outlined by the gap analysis our internal auditors, our internal network has numerous security weaknesses. In short, once our local area network (LAN) has been accessed,...

Img
networking , security

Sample VLAN Request Form

March 11, 2010

  Overview   Add or Remove Specify “add” to add new access, or “remove” to remove access that is no longer required. Note that to achieve the best protection for your application, you should request the removal or any access that is no required. Subnet / Mask The IP...

Img
compliances , security

Wireless Security Checklist

March 10, 2010

Data collection: via Kismet. (freeware): · Is the access point (AP) beaconing? (Is the AP configured to send beacon packets?) · Is the access link layer encryption enabled? (Wireless Encryption Protocol) · Is strong link layer encryption enabled? (128 bit WEP) · What channel is the traffic broadcast on? · Is the network...

Img
compliances , security

Sample MIL-STD-100 Objectives

March 10, 2010

The primary objective of the Standard Operating Environment was to develop the platform baseline for the Network Management Systems for Corporate campuses (Corporate NSM).   This standard methodology would then be applied to all campuses in the implementation of the Enterprise Network Management Platform. · Detail the NSM solution including...

Img
security , virtual-vmware

Citrix Security Checklist

March 9, 2010

· Does a unique account group for Citrix users exist? · Are default user accounts disabled on the server? · Does the server have the latest security patches installed? · Is the Administrator account name default? · Are one-time-passwords used?

Img
o-s , security

Windows XP Host Assessment Checklist

March 9, 2010

· Are Physical Security measures in place? · Is the BIOS password protected? · Does the computer Boot from a CD? · Is AutoRun for the CD-ROM enabled? · Is it possible to run Programs from the CD? · Are Operating System Restrictions in place? · Is NTFS enabled on all partitions? · Is File Sharing...

Img