Annexure – ‘A’ GENERAL AS WELL AS TECHNICAL TERMS AND CONDITIONS 1. The vendor must be in the field of Information Security Auditing for at least five years with propriety Information Security courses. 2. The vendor must have conducted at least one Information Security Auditing for a Government organization. 3. The company or any member of the Consortium/Joint Venture is not black listed by any Government Department / Public Sector. 4. The company for security audit must have successful completed five audits over a period of five years. 5. The participating firms/companies are requested to attach self attested legible documentary proof for the following documents with their technical bid. In the absence of any of these documents, the bid shall be disqualified/rejected straightway without providing reasons:a) Details and qualifications of Auditor(s) b) Documents relating to experience of conducting minimum five security audit works as specified in clause No.4 above. c) Service Tax registration certificate. d) Latest Service Tax deposit receipt/challan. e) A list of owners/ partners etc. of the company/firm with their contact numbers f) Application Fee as prescribed g) A Certificate to the effect that the firm is neither blacklisted by any Govt. Department nor any Criminal Case is registered/pending against the firm or its owner(s) or partners anywhere in India. h) EMD as prescribed i) All other supporting documents as required in the tender shall be attached. 6. The Tenderer must have to issue audit certificates by auditors as per guidelines of CISSP/ISMS LA / CISM/ CISA/ ISA etc. 7 A copy of terms and conditions duly signed by the tenderer, as a token of acceptance of the same should be attached along-with the tender. 8 For Internal Security Audit (Web): a. Firms/Organizations shall also have to assist/undertake in patching vulnerabilities after security audit. b. Firms/Organizations shall also have to assist/undertake in coding and update vulnerabilities after security audit. c. The internal security audit should be completed within 45 days from the date of award of work order. d. In case, the firm does not complete internal audit work within the stipulated period i.e. 45 days from the date of confirmed work order, a penalty amounting to 2.5% of the quoted amount (per day) will be imposed on the contractual firm, subject to maximum 10% of the entire amount after a week. 9. For Internal Security Audit (Network): a. Firms/Organizations shall also have to assist/undertake in patching vulnerabilities after security audit. b. The internal security audit should be completed within 15 days from the date of award of work order. c. In case, the firm does not complete internal audit work within the stipulated period i .e. 45 days from the date of confirmed work order, a penalty amounting to 2.5% of the quoted amount (per day) shall be imposed on the contractual firm. Annexre – ‘B’ THE SCOPE OF PROPOSED WORK The Network and Security Audit for IT CENTRE/PHQ would cover the following scope: 1. Network Audit of IT DEPARTMENT ‐ The audit has to be conducted on people/process/technology as per international standards and will involve the Computer Facility of IT CENTRE/PHQ. 2. Comprehensive Technical Audit – Even though a Vulnerability Assessment and Penetration Testing is a part of ISMS implementation, this project has a requirement of a comprehensive technical audit which moves beyond the scope of normal audits. This includes Application Security for critical applications as well as for security appliances like Firewalls, IDS / IPS etc. The audit will be done for all the IT assets of the organization. 3. Ongoing Implementation Support – Analysis of audit reports created as a result of the audit exercise and preparation of subsequent Risk Treatment Plan and creation of customized patches for applications wherever required. i) ISO SECURITY AUDIT AND IMPLEMENTATION GUIDELINES To set up an Information Security Management System is an integrated part of any organization. ISMS should ensure that Information Security as a conglomerate of people, process and technology and enables companies to measure the risk to their information and ensure the selection of adequate and proportionate security controls that protect information assets and give confidence to interested parties including an organizations user. – Security policy – Organization of information security – Asset management – Human resources security – Physical and environmental security – Communications and operations management – Access control – Information systems acquisition, development and maintenance – Information security incident management – Business continuity management and Disaster Recovery – Compliance Deliverables • Information Security Policy • Risk Assessment Matrix • Risk Treatment Plan • Procedure manual • Business Continuity Plan • Disaster Recovery Plan • Report submission on recommendations on the IT architecture of the Data center • Technology Audit Report for the Data Center • Patching implementation plan report • Risk analysis report i) Network Assessment, its Vulnerabilities and Penetration Testing The scope of the job is to carry out audit of the entire Network and web applications of IT CENTRE/PHQ and its centers. The vendor shall provide services for: • The Applications Security audit has to be done on the following parameters ‐ - To Assess Flaws in Web hosting Software i.e Security of web server. - To Assess Flaws in the Design of the Applications. - Attempting to guess passwords using password‐cracking tools. Checking if commonly known holes in the software exist. The Intra DP Portal should be audited as per the Industry Standards and also as per the OWASP (Open Web Application Security Project) model. • 1. The Intra DP Portal should be audited as per the Industry Standards and also as per the OWASP (Open Web Application Security Project) model. 2. The auditor is expected to submit the final audit report after the remedies/recommendations are implemented. The final report will certify the particular Intra DP Portal “Certified for Security“. 3. Auditor must test various web applications for web attacks. The various checks/attacks /Vulnerabilities should cover the following or any type of attacks, which are vulnerable to the Intra DP Portal. Vulnerabilities to SQL Injections CRLF injections Directory Traversal Authentication hacking/attacks Password strength on authentication pages Scan Java Script for security vulnerabilities File inclusion attacks Exploitable hacking vulnerable Web server information security Cross site scripting PHP remote scripts vulnerability HTTP Injection Phishing a website Buffer Overflows, Invalid inputs, insecure storage etc. Any other attack that can be a vulnerability to the website or web applications 4. The Top 10 Web application vulnerabilities, which are given below, should also be checked, but not restricted to the following. The best practices in the industry must be followed. i. ii. iii. iv. v. vi. vii. viii. ix. x. Cross Site Scripting (XSS) Injection Flaws Malicious File Execution Insecure Direct Object Reference Cross Site Request Forgery (CSRF) Information Leakage and Improper Error Handling Broken Authentication and Session Management Insecure Cryptographic Storage Insecure Communications Failure to Restrict URL Access ii) 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. iii) Audit Report The Website security audit report is a key audit output and must contain the following: Identification of Auditee (Address & contact information) Dates and Location(s) of audit Terms of reference (as agreed between the Auditee and Auditor), including the standard for Audit, if any. Audit plan. Additional mandatory or voluntary standards or regulations applicable to the Auditee. Audit Standards should be followed. Summary of audit findings including identification tests, tools used and results of tests performed (like vulnerability assessment, application security assessment, password cracking and etc.) A. Tools used B. List of vulnerabilities identified C. Description of vulnerability D. Risk rating or severity of vulnerability E. Test cases used for assessing the vulnerabilities F. Illustration if the test cases to provide the vulnerability G. Applicable screen dumps Analysis of vulnerabilities and issues of concern. Recommendations for action. Personnel involved in the audit, including identification of any trainees. The auditor may further provide any other required information as per the approach adopted by them and which they feel is relevant to the audit process. Expectations of Auditee from the Auditor Following are the expectations of Auditee from the auditor: 1. Verification of possible vulnerable services will be done only with explicit written permission from the Auditee. 2. With or without a Non-Disclosure Agreement Contract, the security auditor will be ethically bound to confidentiality, non-disclosure of customer information, and security testing results. 3. Auditor should have clarity in explaining the limits and dangers of the security test. 4. Seeking specific permissions for tests involving survivability failures, denial of service, process testing, or social engineering will be taken. 5. The scope should be clearly defined contractually before verifying vulnerable services. 6. The scope should clearly explain the limits of the security test. 7. The test plan should be submitted and must include both calendar time and manhours. 8. The security auditors are required to know their tools, where the tools came from, how the tools work, and have them tested in a restricted test area before using the tools on the customer organization. 9. The exploitation of Denial of Service tests is done only with explicit permission. 10. High risk vulnerabilities such as discovered breaches, vulnerabilities with known, high exploitation rates, vulnerabilities which are exploitable for full, unmonitored or untraceable access, or which may convey immediate risk, discovered during testing are to be reported immediately to the Information Technology Centre, Police Headquaters, Delhi Police with a practical solution as soon as they are found. 11. The Auditor is required to notify the Auditee whenever the auditor changes the auditing plan, changes the source test venue, has high risk findings, previous to running new, high risk or high traffic tests, and if any testing problems have occurred. Additionally, the Information Technology Centre, Police Headquaters, Delhi Police is to be notified with progress updates at reasonable intervals. 12. Reports should state clearly all states of security found not only failed security measures. 13. Reports will use only qualitative metrics for gauging risks based on industry-accepted methods. These metrics are based on a mathematical formula and not on feelings of the auditor. 14. The Auditor is required to notify the Information Technology Centre, Police Headquarters, Delhi Police when the report is being sent as to expect its arrival and to confirm receipt of delivery. 15. All communication channels for delivery of report are end to end confidential. 16. Auditor shall be responsible for ongoing implementation support which includes analysis of audit reports created as a result of the audit exercise and preparation of subsequent Risk Treatment Plan and creation of customized patches for applications wherever required. 17. Auditor has to work to analyze the existing network and bottleneck and to propose a efficient network design, secure data flow and architecture for IT Center, Police Headquarters, New Delhi. 18. Comprehensive Technical Audit – Even though a Vulnerability Assessment and Penetration Testing is a part of ISMS implementation, this project has a requirement of a comprehensive technical audit which moves beyond the scope of normal audits. This includes Application Security for critical applications as well as for security appliances like Firewalls, IDS / IPS etc. The audit will be done for all the IT assets of the organization and auditor has to ensure the same. 20 The work is to carry out audit of the INTRADP Network of IT Center, Police Headquarters, New Delhi. The vendor will provide services for: • Evaluation of the current IT/Network infrastructure of IT Center along with the devices in use, Operating Systems, Database and Application packages, Operational Procedures and its website. • Evaluating the design of Network Architecture, recommend changes/ new designs/layouts, and document the security architecture so as to conform to the International Standards and Industry‐wide accepted best practices. • Identification of vulnerabilities, security flaws, gaps and loopholes in the IT systems. These include but are not limited to : o Workstations /Desktops o Switch o Router o Web Servers o Application Servers o Proxy Server o Remote Access Server o Internet Gateway o Firewall o Wireless Network/Wi‐Fi • Fixing the vulnerabilities in deployment of applications/systems, and recommend fixes for system vulnerabilities in design or otherwise for the IT Infrastructure. • • Creating customized patches for vulnerabilities which cannot be rectified by availing of regular patches to overcome security loopholes/flaws. There may be a change in network configuration, servers and devices from the time of release of tender to the time actual audit begins. Such a change needs to be accommodated by the Auditor. 21. Attempting to overload the systems using Distributed Denial of Services (DDOS) and Denial of Services (DOS) attacks. 22. Attempting penetration through perceivable network equipment / addressing and other vulnerabilities like IP Spoofing, Buffer Overflows, Session hijacks, Account Spoofing, Frame Spoofing, 23. Auditor must ensure the following: 24x7availability of solution architecture to all users. Date and time stamp are appearing correctly on all reports. Servers are updated with latest security patches. Remote server Management Software used, Web logic server is up to date, Operating system version used. Logical Access Controls Techniques viz. Passwords, Smart Cards or Other Biometric Technologies. Computer Access, messages are logged and security violations reported and acted upon. Effectiveness of Tools being used for monitoring systems and network against intrusions and attacks. Proper infrastructure and schedule for back up is fixed, testing of back‐up data done to ensure readability. Any other items relevant in the case of security. The following are the Applications of IT Centre, PHQ available on Cyber Highway Network of Delhi Police – Intranet. 1) 2) 3) 4) 5) 6) 7) 8) 9) 10) 11) 12) 13) 14) 15) Web-based Personnel Information System (WebPIS) Complaint Monitoring and tracking System(CMTS) Court Cases Monitoring System (CCMS) Promotion Process System for ‘A’ and ‘C’ List Examinations Summon Warrant Software Rewards Monitoring System. Office procedure Standing orders Circulars All other Informations available on IntraDP Portal. Mobile Applications developed on Android, iOS, Windows and Blackberry Network audit is restricted to IntraDP Portal, NIC SMS, Gateway and NIC sites. Quarter Allotment application. Automated posts and transfer system. The small apps and informations. With the advancement in Computer and Information Technology, the use of Internet and Information sharing has been increasing at a rapid pace. One of the negative impacts of such a rapid increase was the large increase in new information threats which has increased with a tremendous pace in the last few years. As per the CERT (Computer Emergency Response Team) guidelines it is recommended for all PSU’s to undergo Network and security audit to be safe from Cyber Terrorism. It has been proven that computer networks have to be continuously monitored for vulnerabilities from known vulnerability attacks and countermeasures must be taken to keep networks secure. Thereby, a need for IT Network and Security process backed by specialized products to find and plug insecurities and implement security policy required for network to be worthy of interconnection with international partners and doing business with them. To conduct a third party a) Network Audit for efficient Network design and dataflow b) Information Security Audit for ISMS Implementation. The audit ensures that the IT architecture is secure from Cyber Attacks and all the Information assets of the organization are secure from outsiders. The audit ensures that the processes of the organization are streamlined to ensure maximum security of Information. The firm will be required to perform the following jobs:iv) REQUIREMENTS FOR AN AUDIT The following needs of IT CENTRE/PHQ have to be met – Security policy compliance for the of IT CENTRE/PHQ like: ‐ o The policy should be concerned with confidentiality, integrity and availability of the data as well as with accuracy, reliability, performance and functional correctness of the information system. o Database Security: ‐ Storing data in the database environment, database specific security should be established. Continuously assess business and technical Security risks Comprehensive Vulnerability Assessment and Penetration Testing of the IT architecture of IT CENTRE/PHQ. Vulnerability remediation including patch management. Report enterprise‐wide security posture. ISMS audit and Implementation training. To analyze the existing network and to propose an efficient network design and architecture for IT CENTRE/PHQ. To analyze the existing bottleneck in IT network and suggestions for efficient and secure dataflow, etc. ISMS= Information Security Management System v) Auditors will carry audit on every change in the application, network etc. as per this scope of work for one year from the date of start of auditing. A fresh report will be submitted after completion of every audit. The audit is to begin within 15 days of receiving order. Annexure ‘C’ ADMINISTRATIVE AND FINANCIAL TERMS & CONDITIONS 1. Separate envelope should be used for TECHNICAL BID as well as for COMMERCIAL BID. The word “TECHNICAL BID/COMMERCIAL BID” shall be prominently super scribed on the top of each envelops. Both these envelops duly sealed may be put in a bigger cover which should also be sealed and super scribed and addressed to DCP/Genl. Admn., Delhi. 2. The tender should reach this office by 31.08.15 at 2.30 PM. 3. No tender will be accepted by hand and tender received late will not be entertained. Incomplete and conditional tender(s) will not be accepted at any cost. 4. The Technical Bids will be opened first on 31.08.15 at 1500 Hrs. and the Commercial/Price Bid will be opened of those firms only, who will qualify technically. 5. Only Service Tax registered agencies are eligible to participate this tender. Interested firms shall quote their Tin Number and also attach documentary proof of having registered with Service Tax Department with the technical bid. 6. Latest service tax deposit receipt/Challan must be attached with technical bid. 7. The tendering firm will have to submit demand draft of Rs.500/- as application fee in favour of DCP/Genl. Admn., Delhi with the Technical Bid which is non refundable. 8. In case the firm fails to attach the draft of application fee, the tender shall be rejected straightway and no plea will be entertained later-on. 9. Optional tender will not be accepted. 10. No tender will be accepted without requisite EMD. The tendering firm shall have to submit earnest money deposit (EMD) of Rs.10,000/- and the same shall be in the shape of A/C Payee Demand Draft, FDR, Banker’s cheque or Bank Guarantee from any Commercial Bank in an acceptable form in favour of Dy. Commissioner of Police, Genl. Admn., Delhi payable at Delhi. No interest will be paid on EMD. The EMD should be valid for Forty Five days beyond the bid validity. 11. The price must be quoted both in words as well as in figures. Nothing over and above the quoted price would be payable to the successful bidder. If there is any over writing/cutting etc. in the tender, the same will be rejected. 12. The firm whose rates are accepted will have to deposit 10% of the total cost of the item as Performance Security in the shape of Bank Draft/Bank Guarantee/FDR from any Commercial Bank in an acceptable form in favour of DCP/Genl. Admn, Delhi within a period of 7 days from the date of confirmation, in this regard. The Performance Security should remain valid for a period of 60 days beyond the date of completion of all contractual obligations of the supplier including warranty obligations. The work order will then be placed to the lowest firm in further upto 7 days from the date of receipt of Performance Security in PHQ. 13. In case the firm fails to deposit performance security money, the EMD of the firm will be forfeited as well as action for blacklisting can also be taken prior to taking any legal action. 14. The work is time bound; therefore, it should be completed within 45 days from the date of award of work order. In case the firm fails to complete the work within stipulated period, the work will be got done from the open market and the difference of cost, if any, will be recovered from the Security Money of the firm. 15. The tenderer can remain present himself or through his authorized representative at the time of opening of tender. Only authorized representatives will be allowed to attend the meeting of the purchase committee. They should also bring Letter-Head of the firm with an undertaking that any decision/negotiation taken by them would be accepted by the firm. 16. The Bid shall remain valid for three calendar months from the date of opening of the tender. 17. All the firms/companies participating in the tender must submit a list of their owners/partners/directors etc. with their contact numbers and a certificate to the effect that the firm is neither blacklisted by any Govt. Department nor any Criminal Case is registered against the firm/company or its owners/partners/directors anywhere in India. 18. The payment will be made on completion of development work as per the prescribed specification to be verified by Addl.DCP/IT/PHQ. No advance payment will be made. 19. No claim for interest in case of delayed payment will be entertained by the Department. 20. A copy of terms and conditions duly signed by the tenderer, as a token of acceptance of the same should be attached along-with the tender. 21. The purchase committee reserves the right to relax any term and condition in the Govt. interest, with the approval of the competent authority. 22. The purchase committee reserves the right to reject any tender or all tenders without assigning any reason thereof. 23. The tender will be rejected straight-way without assigning any reasons if the firm/company or its owner/partner/director involves in any criminal case, declared black listed by any Govt./Semi Govt. Department/agencies etc. 24. All disputes are subject to the jurisdiction of the Courts in the NCT of Delhi. 25. No foreign company shall be entertained directly. However, as per the Compulsory Enlistment Scheme of the Department of Expenditure, Ministry of Finance, it is compulsory for Indian agents, who desire to quote directly on behalf of their foreign principals, to get themselves enlisted with the Central Purchase Organization (eg.DGS&D). 26. In case of violation of any clause of terms and conditions, the explanation of the firm can be called by issuing show cause notice and if the reply is not found satisfactory, security money can be forfeited besides action to blacklist can also be taken including legal action. 27. In case of any difference(s), the firm can be called for negotiation to patch up the differences on table prior to approaching the Court. NOTE :(A) DOCUMENTS REQUIRED TO BE ATTACHED WITH TECHNICAL BID IN THE FOLLOWING ORDER:1. The Demand Draft of Rs.500/- as applicable fee. 2. EMD in favour of DCP/Genl. Admn., Delhi amounting to Rs.10,000/- 3. Service Tax Registration Certificate. 4. Latest service tax Clearance Certificate. 5. Copy of terms and conditions duly signed with seal of the firm, in token of acceptance of terms and conditions. 6. All the firms/company participating in the tender must submit a list of their owners/partners/directors etc. and a Certificate to the effect that the firm is neither blacklisted by any Govt. Department nor any Criminal Case is registered against the firm/company or its owner/partners/directors anywhere in India. 7. 8. Details and qualifications of Auditor(s) Documents relating to experience of conducting minimum five security audit works 9. All other supporting documents as required in the tender shall be attached. (B) DOCUMENTS REQUIRED TO BE ATTACHED WITH COMMERCIAL BID IN THE FOLLOWING ORDER :Security Audit of IntraDP (Intranet of Delhi Police), Personnel Information System and other Delhi Police applications of IT Centre, PHQ. COMMERCIAL BID shall contain price only and no other documents shall be enclosed with the Commercial Bid. Price :- In figures :_________________________________________________________ In words :_____________________ ASSTT. COMMISSIONER OF POLICE: HDQRS.(G): DELHI. SING. OF TENDERER : _______________________________ NAME IN BLOCK LETTERS : ________________________ FULL ADDRESS : __________________________________ _________________________________________________