UT Cloud Evaluation Form

advertisement
INFORMATION SECURITY QUESTIONNAIRE
Cloud/Hybrid Hosted Solution
The University of Toledo
Information Security Questionnaire
“Cloud/Hybrid Hosted Solution”
Please also attach any flow diagrams, configurations,
documentation, and certifications when returning this
completed form.
Information Security Questionnaire – The University of Toledo
Page 1 of 8
Version 1.0
INFORMATION SECURITY QUESTIONNAIRE
Cloud/Hybrid Hosted Solution
A. General Information: Vendor Demographics and Product Information
1. Business Name and Address:
2. Name and Contact Info of Vendor Representative completing questionnaire:
- Name:
-Phone Number:
-Email:
3. Date Completed: mm/dd/yyyy
4. URL of vendor website(s) that UT will access: www.webaddress.com
5. What is the name and version of the application/system being assessed?
-Application Name:
-Version Number:
6. On which hardware platform(s) and operating system(s) will this application/system reside on?
Windows, Version:
Linux, Version:
Apple, Version:
IOS, Version:
Other, Name:
Optional Comments:
UNIX, Version:
Version:
7. Does this application/system store AND/OR transmit any sensitive data? (ePHI, FERPA, financial
transactions, etc.)
Yes, Stores confidential data
Yes, Transmits confidential data
No, confidential data is stored or transmitted
Data Type:
Patient data
Personal Identifiable / Employee data
Optional Comments:
Confidential business (planning, financial, etc.)data
Credit Card (CHD), Merchant ID (MID), CVV2 or CVC2
8. Have other UT locations deployed this application/system yet?
If Yes, list locations:
Information Security Questionnaire – The University of Toledo
Page 2 of 8
Yes
No
Version 1.0
INFORMATION SECURITY QUESTIONNAIRE
Cloud/Hybrid Hosted Solution
9. Will this application/system, if purchased by UT, be supported by a UT Health analyst or by the
vendor after implementation?
This application/system will be supported by [Organization] after implementation
This application/system will be supported by the vendor after implementation
By both but there will be a separation of duties
Explain:
10. Is this an FDA regulated system (if applicable)?
- If yes, when can you supply us a copy of the MDS2 form?
This is not an FDA regulated system
This is an FDA regulated system
B. Hybrid (Fill out this section only if application requires local resources)
1. What type of UT Hosted resources will you need and their purpose? (Servers, VPN, Mirth, etc):
2. What are the requirements for the UT Hosted resources? (Server Specs, etc)
3. What Access to these resources will Vendor need? (VPN, Site to Site, Dedicated Line?)
C. Antivirus Protection / Workstation
1. UT Anti-virus/Anti-Malware (AV) to be installed on all PCs and Servers. Will this be a problem?
Yes
No
If Yes, Please Explain:
2. Does your application/system require any special configuration or file exclusions for AV?
If yes, UT will need a comprehensive list of the exclusions and documentation demonstrating justification for the
exclusions (i.e. real-time scanning, file or folder exclusions).
Yes
No
The list of AV exclusions has been provided.
List of Exclusions if not provided:
3. Please answer the following if AV exclusions are necessary:
a. Are these exclusions for “real-time” scanning only?
Yes
No
b. If “real-time” is excluded, can [Organization] still plan to do weekly scheduled full scans?
Yes
No
c. Are these exclusions expected indefinitely?
Information Security Questionnaire – The University of Toledo
Permanent
Page 3 of 8
Temporary Until:
Version 1.0
INFORMATION SECURITY QUESTIONNAIRE
Cloud/Hybrid Hosted Solution
d. Do your developers have plans to work on a future version that allows AV to work on the
system without exclusions?
Yes
No
e. If the problems that AV causes are related to performance issues (as opposed to causing data
corruption) is it permissible to turn on “real-time” scanning on a temporary basis in order to
assist in resolving malware incidents?
Yes
No
4. UT Health deploys Microsoft System Center protection on all endpoints. Has this application(s)
been tested with SCEP?
Optional Comments:
Yes
No
5. Will an application/add-on need to be installed on the workstations?
a. If Yes what are the Supported Operating System/System Specs?
b. Does your Program require clients to use Web browser?
If Yes list supported browsers and versions are supported:
6.
Yes
Yes
No
No
c. Will it require any additional 3rd party software? (Flash, Java, Adobe Reader):
Yes
If Yes please list the required 3rd party software and the most recent supported versions:
No
d. Will you notify us if a recent update to a 3rd party software has known issues:
No
Yes
Is there any known issues with the workstations using encryption on them? We currently run
McAfee, Winmagic and Bit locker.
Yes
No
D. Network Services
1. What network services are required to support this application? (e.g., SMTP, FTP, HTTP, FTP, File
sharing, SNMP, etc.). PLEASE INCLUDE DATA FLOW DIAGRAMS. LIST ALL TCP, UDP, ICMP NEEDED
PARTS AND EXPLAIN PURPOSE
Please List all:
2. If unsecure services are used (HTTP, FTP, Telnet, SNMP v1&2, etc.) can the secure alternatives be
used instead (HTTPS, SFTP, SSH, SNMP v3, etc.)?
Information Security Questionnaire – The University of Toledo
Yes
Page 4 of 8
No
Version 1.0
INFORMATION SECURITY QUESTIONNAIRE
Cloud/Hybrid Hosted Solution
Comments:
3. If the more secure alternatives cannot be used at this time, are there any actual plans to move to
the more secure alternatives in the near future?
If Yes please give an expected timeframe:
Yes
No
4. Are network shares required?
Yes
No
If Yes, Please provide share details including file and folder permissions needed:
5. What directory services does the application require? (e.g., DNS, LDAP, etc.)?
List all that apply:
6. Is transmission of data between endpoints encrypted?
Yes
No
If yes, please describe the algorithms and key strengths your solutions is capable of supporting:
7. If data transmission is not encrypted, can a third-party encryption solution be used to provide this
layer of security?
Yes
No
8. UT currently uses a Network Load balancer called F5. Will this be utilized in any way for your
application?
Yes
No
9. Will your application require any ports open in our outside firewall?
Please list all Ports and their purpose:
E.
Authentication and Access Control
1. Does the application / system use hard coded passwords?
Yes
No
a. If yes, are the passwords encrypted when transmitted?
Yes
No
2. Will there be any problems with changing ANY default or factory set passwords/passcodes?
Yes, we have passwords/passcodes that are hard-coded
No, all passwords/passcodes may be changed
3. How will user authentication take place for this system?
You may use University of Toledo Active Directory to manage user authentication and authorization
This system has its own authentication and authorization mechanism
4. If this system utilizes its own user authentication process, please describe that process and how it
works:
Information Security Questionnaire – The University of Toledo
Page 5 of 8
Version 1.0
INFORMATION SECURITY QUESTIONNAIRE
Cloud/Hybrid Hosted Solution
5. If this system utilizes its own user authentication process, do controls exist to enforce secure
password policies? Please check all that apply:
Minimum Length
Password Complexity
Expiration
Password History
6. Which methods are used to authenticate users to this application? Please check all that apply:
Unique User ID
Password
Challenge Questions
Hardware Token
None at all
Software Token
Other | List Others:
7. Who will be responsible for creating and managing user accounts?
UT
Vendor
8. If this system utilizes its own user authentication process, please describe the process of how an
account can be suspended or revoked if needed.
9. For the authorization aspect of this system, please list the various account types native to this
system and what their capabilities are (e.g., admin, user, super user, etc.):
10. Does this application allow role based access?
Yes
No
If Yes please provide documentation on each role and their rights or list below:
F. Data Security
1. Does your solution provide any validation techniques to ensure integrity when processing/storing
data into the system?
Yes
Please describe if applicable:
No
2. Do any mechanisms exist to ensure the integrity of historically stored data?
Please describe if applicable:
Yes
3. Is disk or file/folder encryption natively used within your system for stored data?
If yes, please describe which algorithms and key strengths the system is capable of:
No
Yes
No
4. If sensitive data is stored within this application/system, has the application been audited for
compliance with federal or industry regulations and standards (HIPAA, PCI, etc.)?
IF YES – FILL OUT PCI AND CONTROL ADDENDUM
Yes
No
G. System Logging
Information Security Questionnaire – The University of Toledo
Page 6 of 8
Version 1.0
INFORMATION SECURITY QUESTIONNAIRE
Cloud/Hybrid Hosted Solution
1. What activity can be audited through the system logs? (Check all that apply)
Date and time of login
User account that logged on
(Reading, Modifying, Deleting)
Date and time of logout
Specific activities performed by users
Other (please describe)
2. Which data types are stored in the system logs?
Patient data
Personal Identifiable / Employee data
Credit Card (CHD), Merchant ID (MID), CVV2 or CVC2 data
Confidential business (planning, financial, etc. )data
3. Are sensitive data stored in the log files? (e.g., passwords, SSN’s, etc.)
Yes
No
4. Does the application/system have the capability of utilizing a centralized logging mechanism?
Yes
No
5. Are the log files archived for protection and future needs?
Yes
No
6. Is encryption used to protect the confidentiality and integrity of the stored logs? If yes, what
algorithms and key strengths.
Yes and the algorithms and key strengths are
7. Can UT access the user activity / audit logs without vendor intervention?
If Yes please explain the process:
No
Yes
No
H. Webpage Security (Skip if application has no website functionality)
1. Does your system utilize webpage based access for users or administrators as opposed to installing
specialized client software for access?
Yes
No, client software must be installed. Webpages are not used in this system. If No, skip the remaining
questions in this section.
2. If a web server is part of this system setup, which web server(s) are used?
Apache
IIS
Other | Specify:
3. Will the latest version of this web server be used?
Yes, the latest will be used
No, the version we use is:
4. Which web protocol will be used with this system?
Information Security Questionnaire – The University of Toledo
Page 7 of 8
Version 1.0
INFORMATION SECURITY QUESTIONNAIRE
Cloud/Hybrid Hosted Solution
HTTP
HTTPS
Both, depending on what part of the site is accessed
5. Can the HTTP settings be set to redirect all traffic from port 80 to port 443 and use HTTPS
exclusively?
Yes
No
6. What version(s) of SSL/TLS does this web server/application support? Select all that apply:
None
SSL v1
SSL v2
SSL v3
TLS v1
TLS v1.1 and above
7. Can earlier versions of SSL that have been identified as vulnerable be disabled?
Yes
No
8. Will the webpage of this system be available through the Internet or is this an internal use only
system?
Internal only
This system will have an Internet facing presence
I. Compliance and Privacy
1. Are you willing to sign a BAA with of our language?
Comments:
2. Do you use Depersonalized data from our users?
Yes
Yes
No
No
a. If Yes, can you please share what purpose and how this is done.
J. End of Life
1. Is there an end of life for this current version?
Yes
a. If so when is it predicted? Date or time frame:
b. Is there a known cost for upgrades?
Comments:
Yes
No
No
2. If your services are rendered no longer needed, are we able to get our data that you hosted?
Yes
No
Comments:
Information Security Questionnaire – The University of Toledo
Page 8 of 8
Version 1.0
Download