Business Expense Automation Software Tool: Technical

advertisement
Business Expense
Automation Software
Tool:
Technical Requirements
Issue Date: July 10, 2015
IESO Confidential
Table of Contents
No table of figures entries found. .................................................................................................... 3
1. Technical Requirements.............................................................................................................. 4
1.1
Introduction....................................................................................................................... 4
1.2
Technical, Security and Access Control Requirements for SAAS Vendor ............... 5
1.3
IT Architecture for On-premises Software Vendor ................................................... 11
1.4
Integration Capabilities ................................................................................................. 13
1.5
System Administration .................................................................................................. 16
1.6
Training and Knowledge Transfer ............................................................................... 18
Appendix A – IESO IT Supported Platforms .............................................................................. 21
References........................................................................................................................................... 22
Related Documents ........................................................................................................................... 22
IESO Confidential
Page 2 of 22
Table of Figures
No table of figures entries found.
IESO Confidential
Page 3 of 22
1.
Technical Requirements
1.1
Introduction
The purpose of this document is to specify the IESO’s requirements for a Business Expense Tool,
(Tool). The document specifies high level technical requirements for the solution which the IESO is
seeking. The proposed solution can be cloud-based Software as a Service (SAAS) or On-Premises
deployment.
Instructions:

Respondents that are proposing a SaaS solution should complete Section 1.2.

Respondents that are proposing an On-Premises solution should complete Section 1.3.

All Respondents should complete Sections 1.4, 1.5 and 1.6.
IESO Confidential
Page 4 of 22
1.2
Technical, Security and Access Control Requirements for SAAS Vendor
This section needs to be completed by Cloud vendors that are proposing SAAS.
Functional
Existence
Priority
Question
Vendor
Response
Vendor Detailed Description
Yes/No
True/False
Applicable/Non
-applicable
1. Which browsers do you support?
2. Describe how your solution would support testing of
configuration changes.
Critical
Do you provide testing environment for solution?
3. IESO Data Protection;

How do you separate IESO data from other
customers' data?

Describe how third party, (your service providers),
access IESO data?

Can you ensure that all IESO data is erased at the
end of service contract?

Where do you store IESO data, (including backups)?

How do you get data from the IESO to your
environment?

How do you transfer data from one place to
another?

What are your data leak prevention capabilities?
Critical
IESO Confidential
Page 5 of 22
4. Vulnerability Management;

Document previous examples of your vulnerability
management program?

How often do you scan for vulnerabilities on your
network and applications?

What is your vulnerability remediation process?
5. Identity Management ;

Does authentication need to occur before accessing
your offering? Describe the available options.

Can you support federation, and if so which
standard?

Explain how you can integrate directly with IESO
directories? (If you keep your own user accounts:
How do you secure user IDs and access credentials?)

How do you handle user churns (e.g., provision and
de-provision accounts)?

Do you support SSO and which standards?

Do you support Lightweight Directory Services (LDS)
for SSO?

Do you support role-based access control?
6. Physical and Personnel security;

Is there restricted and monitored access to customer
assets 24x7?

If dedicated infrastructure is desired, how would it be
isolated?

Do you perform background checks on all relevant
personnel? How extensive?

Do you document employee access to customer
data?
Critical
Critical
Critical
IESO Confidential
Page 6 of 22
7. Application security;

Do you follow Open Web Application Security Project
(OWASP) guidelines for application development?

Do you prescribe to any of the following software
development life cycle models? SEI CMM, DOD-STD2167A, MIL-STD-498, ISO/IEC/IEEE/EIA J-STD-016 or
12207.

Do you have a testing and acceptance procedure for
outsourced and packaged application code?

What third-party apps, (components), are in use in
your services?

What application security measures, (if any), do you
use in your production environment, (e.g.,
application-level firewall, IPS, database auditing)?
8. Incident response;

What is your procedure for handling a data breach?

Can notification occur within an IESO specified time
period? (e.g., 30 days)

In what format are data breach incident response
(DBIR) notifications published in (e.g., VERIS), and
what information do they contain?
Critical
Critical
IESO Confidential
Page 7 of 22
9. Service Privacy;

How do you protect digital identities and credentials
and use them in Cloud applications?

What data do you collect about the IESO?

How is the data stored?

How is the data used?

How long will the data be stored?

Under what conditions might third parties, including
government agencies, have access to IESO data?

Can you guarantee that third-party access to shared
logs and resources won’t reveal critical information
about the IESO?
Critical
IESO Confidential
Page 8 of 22
10. Service Compliance;

Provide documentation of a SAS 70 or SSAE 16 or
CSAE 3416 audit report.

Can we stipulate in the Service Level Agreement (SLA)
that all IESO data (or applications), including all
replicated and redundant copies, are owned by the
IESO?

Do you have any Disaster Recovery and Business
Continuity planning documents capable of being
shared with the IESO?

Where are your recovery data centers located?

What service-level guarantee can you offer under
Disaster Recovery conditions?

Are there provisions, specifications or metrics in the
SLA for investigations?

How long do you keep logs and audit trails?

How can IESO have dedicated storage of logs and
audit trails?

Can you demonstrate evidence of tamper-proofing
for logs and audit trails?

Can you provide documentation of ISO 27001
compliance?

Can you provide documentation of Payment Card
Industry (PCI) compliance?

What recourse actions, (e.g., financial compensation,
early exit of contracts, etc.), are available in the event
of a security incident?

In the event that the contract is terminated, or the
agreement comes to an end, will data be packaged
and delivered back to the IESO?

Will any remaining copies of data be erased
completely, (including from backups)? If so, how soon
will it happen?
Critical
IESO Confidential
Page 9 of 22
11. Service Availability;

The primary use of the system is during business
hours between 7am and 6pm. There will be no
planned outage during business hours. If there is an
emergency outage required then IESO shall be
notified.

The system’s architecture shall be easily scalable to
increase the number of users in the future.

The system shall be available 24x7x365.

The system shall have a total reliability of 95% uptime
(this excludes planned outages).

The system’s maximum Time to Recovery shall be
four (4) hours at any time.

How many users are allowed to log in concurrently?

What availability measures do you employ to guard
against threats and errors?

Do you use multiple Internet Service Providers?

Do you have Denial-of-Service attack, (DDoS attack)
protection?
12. Service Provider Audit Capability;

Can you offer Audit Logging Capabilities that include
but are not limited to activities of Authentication,
Authorization, (privilege changes), Modification, (of
core components), and User Operations,
(repudiation). Log records include date and time
stamps, name or unique ID of event, specified object,
(user, policy, object, etc.), and severity?

Can you export Audit logs on a continuous basis?
Critical
Desired
IESO Confidential
Page 10 of 22
1.3
IT Architecture for On-premises Software Vendor
This section is to be completed by vendors that are proposing on-premises software.
Requirement
Functional
Existence
Priority
Vendor
Response
Vendor Detailed Description
Yes/No
True/False
Applicable/Non
-applicable
13. The proposed solution shall conform to scalable n-tier
architecture as per IESO IT Standards (Appendix A).
Critical
14. The proposed solution shall be provided for 2 environments
(QA and Production). Two complete (Tool) systems will be
installed to run in parallel.
Critical
15. The (Tool) solution shall provide where indicated in the
requirement immediately above, a full failover / redundancy
compliance and capability potential to meet its availability
requirements (describe functionality and capabilities).
Critical
16. The (Tool) solution shall be able to run in an environment
that is compatible with at least one of the following
operating systems (and permit Integrated Windows
Authentication):
• Microsoft Window Server 2012 R2 (IESO Preference)
• Red Hat Enterprise Linux V7 ES
17. The (Tool) solution database shall be able to run in an
environment that is compatible with at least one of the
following database systems:
• Oracle 11g R2 and above
• MS SQL Server 2008 R2 and above (IESO Preference and
IESO supplied license)
18. The (Tool) servers OS shall be compatible with the other
listed IESO IT Standards (Appendix A).
Critical
Critical
Critical
IESO Confidential
Page 11 of 22
19. The system’s architecture shall be easily scalable to increase
the number of users in the future.
Critical
IESO Confidential
Page 12 of 22
1.4
Integration Capabilities
The proposed solution should provide functionality for supporting integration with IESO systems.
Question
Functional
Existence
Priority
Vendor
Response
Vendor Detailed Description
Yes/No
True/False
Applicable/Non
-applicable
20. The IESO uses Ceridian as its payroll system;
Critical
How would you integrate with the payroll system to obtain
employee information, cost center and organization
hierarchy?
What experience, (if any), do you have in integrating with
Ceridian?
How would you integrate with the Payroll system for
expense reimbursement?
What experience, (if any), do you have with integrating with
Payroll systems?
IESO Confidential
Page 13 of 22
21. The IESO’s current corporate credit card is BMO’s
MasterCard;
Desired
How would you integrate with IESO’s corporate credit card
statements via bank feeds?
How would you load corporate credit card statements and
pre-populate expense items via bank feeds?
What other corporate credit cards do you have experience
integrating with?
Are there any advantages/disadvantages to switching to a
different corporate credit card?
22.The IESO uses Infor Lawson as its finance system;
Critical
How would you integrate with the finance system?
What experience, (if any), do you have with integrating with
IESO’s Finance system?
23. How do you support regulatory, (Office of the Integrity
Commissioner), expense reporting and integrate with the
IESO public website?
Critical
24. How do you integrate application security with Microsoft
Active Directory and support SSO?
Critical
Describe how your solution is able to support the
authentication and authorization integration with AD.
IESO Confidential
Page 14 of 22
25. HRG is the IESO’s travel management provider;
Critical
How do you integrate with travel management providers?
Are you able to integrate with IESO’s travel management
provider?
Describe how your solution is able to support the
integration.
26. Do you offer API access?
Desired
If so, are there any added fees required to access API?
What platforms and programing languages do the APIs
support?
27. Do you partner with any software companies that specialize
in integration?
Desired
IESO Confidential
Page 15 of 22
1.5
System Administration
Question
Functional
Existence
Priority
Vendor
Response
Vendor Detailed Description
Yes/No
True/False
Applicable/Non
-applicable
28. Describe your security model for the proposed solution,
provide documentation if applicable.
Desired
29. Does your solution offer Role-Based Access Control?
(System access based on an individual’s role)?
Desired
30. How does your security model handle the segregation of
duties, for example a user can be an employee and also a
super user of the system?
Desired
31. Explain how the users and security roles are administered?
Desired
32. Can users have more than one security profile?
Desired
33. The solution should enable branding of the IESO logo, the
IESO name and colours that are configurable by IESO system
administrator.
Desired
34. Are system administrators allowed to reset user passwords?
Desired
35. Describe your system’s ability to have customers “configure”
the system to meet their needs instead of having you do it?
Desired
36. Do you provide the ability to audit who has viewed/changed
items in the system (user ID, date & time)?
Desired
IESO Confidential
Page 16 of 22
37. How easy is it to export data from your service when moving
to a new service? Do you offer an option to export the data
in an open data format (e.g., XML)? Are there any added
fees to export data?
Desired
IESO Confidential
Page 17 of 22
1.6
Training and Knowledge Transfer
Question
Functional
Existence
Priority
Vendor
Response
Vendor Detailed Description
Yes/No
True/False
Applicable/Non
-applicable
38. Initial Training;
 Do you do any knowledge transfer at the end of the
implementation?
 Do you provide initial training of the system in terms of
system configuration and application administration?
 Do you provide classroom based, hands-on training with
full documentation of functionality?
Desired
39. Ongoing Training;
 Describe your web based training capability?
 Does your solution offer users “How to” embedded
videos within the key modules?
Desired
IESO Confidential
Page 18 of 22
– End of Section –
IESO Confidential
Page 19 of 22
IESO Confidential
Page 20 of 22
Appendix A – IESO IT Supported Platforms
System Component
Platform (Server)
Standard
Red Hat Enterprise Linux V7 ES
Microsoft Window Server 2012 R2
Platform (Desktop)
Windows 7
Database
Oracle 11g R2 and above
MS SQL Server 2008 R2 and above (Preference and IESO
supplied license)
Web Server
Microsoft IIS 7.5 and above
Apache 2.2 and above
Application server
WebLogic server 10.3
JBoss EAP 5.1
Web Browser
MS Internet Explorer 9.X
Smartphones
Blackberry Classic/Leap, iPhone 5/6
Tablets
Blackberry Passport, iPad
System Interfaces
XML, Web Services, LDAP, JMS, Support for Web Services
standards (SAML, WS Security, SPML (service provisioning
markup language, LIBERTY ID-WSF and ID-FF))
Backup/Restore
Commvault 8.0
LAN/WAN
TCP/IP – ICCP
Enterprise System
Management
Altiris Version 7.1
System Centre
Operations Manager
(SCOM)
7.0.8560
Symantec Management
Agent
Agent version 7.5
IBM Qradar SIEM
Agent Release 29.1
IESO Confidential
Page 21 of 22
References
Document Title
Document ID
Related Documents
Document Title
Document ID
– End of Document –
IESO Confidential
Page 22 of 22
Download