Our Partners close more business.

Use these powerful resources to win more business, faster, with less effort.  
Call 877-411-2220 x121 for personal support with any opportunity.

RESET SEARCH

Hosting Quote Estimator

GET a FREE Sandbox or Trial Environment NOW

How To Use This Tool:  

To find answers to common RFP and RFI questions, select a tag, or, search for terms like "security", "performance", etc.  You will find common questions and answers grouped together in one record.  Follow the tag links to refine your search.  Supporting downloads and documentation are available, below.

Please login to obtain download access to additional supporting documentation.  Registered users can also contribute to the database.  You can request access by Contacting Us.

© Omegabit LLC, 2023

Enter a Search Phrase or Select a Tag

Information Security - SOC 2, HIPPA, FERPA, FEDRAMP, PCI

Q:

Do you have documented physical security policy and procedures?

SSAE 16 / ISAE 3402 SOC 2 Type II audit or equivalent performed by a trusted source

Do you process, store or transmit FRS sensitive PII or PHI? If yes, are there documented Privacy Management Program policy and procedures?

Do you employ independent assessors or assessment team to conduct assessment of the security controls in information systems and services?

How often is this compliance audited? Please provide date and results from most recent audit.


A:

ref: Soc 2 Type II Facilities Compliance Report for Omegabit colocation' facilities managed by Digital West and alternate providers (available on request).

All omegabit facilities are audited by third-party compliance services for SOC-2 compliance are maintained to PCI compliance standards, by default. Omegabit hosted infrastructure is also frequently vetted and audited on a per-customer basis where specific compliance, e.g. PCI, FERPA, FEDRAMP, HIPAA, is required. These certifications must occur against the customer implementation and are typically performed in cooperation with the application sponsor and Client.

This technically falls under the auspice of control of our Client tenants with these requirements and their specific custom application design and implementation. However, we play a participating role in ensuring that issues relating to SOC 2/facilities compliance, data storage and transfer, managed operations and procedures, are performed in a manner that is commensurate with Client requirements. Actual secure data transmissions are accomplished via BOVPN, IPS, SSH, or HTTPS, LDAPS, or similarly secure means at the discretion of the customer and their custom application design. All popular means are supported and can be enabled and secured on request. Data storage encryption is also available on request.

This is performed on a per-client case-basis as required by Client in cooperation with the auditing service or agency of their choosing. Omegabit is able to self-certify and/or work with Client designated teams. Omegabit has established PCI, HIPAA, FERPA, and similar compliance with customers across various verticals and custom application designs. These assessments must be done on a per-Client case basis and be specific to the custom software implementation to be relevant. Compliance certifications, with the exception of Omegabit's SOC 2 facilities compliance, is not transferable across Client tenants, by definition.

The SOC-2 compliance audit is performed every 18-24 months.  



No comments yet. Be the first.

Information Security - Transmission

Q:

Do you protect the confidentiality and integrity of the information being transmitted across each interface?


A:

(assumes SSL site configuration)



No comments yet. Be the first.

Information Security - Wireless

Q:

Do you have an established usage restrictions and implementation guidance for wireless access?

Does wireless access require authorization before connection?

Are wireless connections encrypted using WPA2 or higher?

Do you monitor and restrict connection and use of unauthorized mobile devices, writable, removable media in information systems?

Do you employ full-device encryption or container encryption to protect the confidentiality and integrity of the client information on mobile devices?

Wireless Policy


A:

Ref: Omegabit Employee Handbook, Guidelines and Operations Wiki procedures.

Yes.

Any secure communications are further tunneled and wrapped in either IPSec or SSH depending on the nature of connection. All wifi connections including LAN Wifi are hardened similarly as with public or unprotected network links.

Yes.

IPSec, SSL, SSH (256-bit)

Wireless Policy: This is documented in Part III, Section 6. Wireless Communication Standard, IT Security Handbook.



No comments yet. Be the first.

Information System Components - control

Q:

Do you track, control, authorize, and monitor information system components entering and exiting the facilities and maintain records for those items?


A:

Physical items received into inventory are documented using conventional means including shipping log history and notations by Receiving. As it relates to facilities, equipment added to or removed from the racks is documented in the Omegabit Operations Wiki in a manner that is timestamped, auditable, and tracked for historical purposes.



No comments yet. Be the first.

Information System Documentation

Q:

Do you maintain information system documentation for secure configuration, installation, operation, effective use, maintenance of security features/functions, and known vulnerabilities?


A:

Yes. Omegabit maintains an extensive operational wiki and profile/dossier of each Client infrastructure "stack" and all relevant configuration information. This same system provides detailed technical procedures based on regularly updated defaults, with added customer-specific annotations and adjustments, which helps to apply best practices out-of-the-box and also accommodate necessary changes required by the customer that are relevant and proprietary to their respective environments.



No comments yet. Be the first.

Information Systems - Error message

Q:

Do information systems generate sufficiently generic authentication and other error messages that conceal useful information that may be exploited by malicious users?


A:

This is also a configurable feature of Liferay, which can be stipulated during the software configuration requirements phase of planning.



No comments yet. Be the first.

Information Systems - Security Alerts

Q:

Do you receive information system security alerts, advisories, and directives from designated external organizations on a regular ongoing basis? If yes, do you disseminate internally to parties deemed necessary?


A:

Yes



No comments yet. Be the first.

Information Systems - Software

Q:

Do you have a process in place that governs, tracks, and manages the proper license and installation of softwares on information systems?


A:

This is available as an advanced feature and requires additional software subscription to Omegabit Dynatrace environment monitoring and reporting suite.



No comments yet. Be the first.

Input Validation

Q:

Do you perform input validation checks to prevent intentional and unintentional harm to information and information systems?


A:

Yes



No comments yet. Be the first.

Inventory of Information Systems

Q:

Do you maintain an inventory of your information systems?

Exceptions to limits of support/service:


A:

● Base installation, configuration, and tuning 

● 24x7x365 monitoring and emergency response 

● Backups and disaster recovery management and execution 

● Comprehensive OS runtime container backups

● Disaster recovery and recovery rollback to point-in-time snapshots included

● Assistance with drop-in patches, upgrades and modifications to the runtime environments. 

● Regular OS patching and maintenance administration  

● Periodic log cleanups 

● Server restarts, time needed in the event of OS patches, incremental (minor release) upgrades including non Liferay automated-patching using OS auto-update facilities

● Server restarts in the event of unknown issues like unexplained high utilization, a typical behavior necessitating a restart 

● General Liferay support on feature behaviors and "out of the box" configuration settings 

● Troubleshooting and resolving runtime issues

Examples of work that will typically require additional labor outside the scope of the current Financial Summary include:

          

● Ongoing administrative support for sandboxing or custom configurations

● Advanced change management support

● Major release patching

● Environment customizations for proprietary operations and functionally

● Custom performance tuning and optimization, load testing, predictive analysis

● Developer logistics support

● Custom architecture and scale planning 

 

 



No comments yet. Be the first.

Logging, Reporting, and Analytics

Q:

What logging and auditing features do you support?

Do you log intrusion and security events?


A:

 

Omegabit's active firewalls are constantly thwarting typical (and sometimes, atypical) structured and automated attacks that are common to the Internet.  We keep up to date hourly against a database of published threats that are blocked before they ever reach the portal. That activity is logged and available for analysis by us for forensics and diagnostic purposes.  But, we typically do not report that information to the customer - that information is stored at our cloud and firewall infrastructure levels.  The exception being any logs that are on the servers themselves - customers do have direct access to (Apache, tomcat, db, etc.), and we do sometimes help provide tools like Splunk for analysis.  We also offer some exceptional monitoring and reporting options from Dynatrace, which the customer can use for deep visibility into application and runtime performance using a very rich and intuitive Web based interface and is capable of generating automated reports.   

Generally speaking, these threats are usually bots, they are numerous, and we have advanced dynamic protections in place at several levels to block theses sorts of exploits (most of which are further limited by Liferay security, anyway).  These can occur on the order of many-thousands-per-day and and are typically innocuous.  We do monitor for and react to pattern change as one indicator of potential vulnerability testing by external threat parties.  We are also able to provide advanced threat scanning and analysis for a given customer implementation.  We can accommodate specific logging and auditing requirements on a needs basis, as well as advanced features like Data Loss Protection, and Zero Day threat detection and quarantines, if desirable; these features have some practical disadvantages for typical consumer-facing apps.  But, we can enable them on demand.  

For in-Liferay workflow, which is arguably where the most risk might lie, we encourage implementing Liferay auditing, and also keeping current with fixes and patches.  We can host a central log server for a given infrastructure if the customer so desires.  And are able to assist with and accommodate those features.

Because of our Liferay optimized configurations and setup, our strong security and controls, and our experience operating Liferay's of all shapes and sizes, we are more well-equipped to maintain a secure Liferay environment and respond to threats in a way that is substantive, as compared to <any> other hosting option.  Notification is critical, but, we also take ownership of the problem:  the customer's security is our security.

Typically, what we offer OOTB is more than sufficient, except where special reporting or auditing requirements exists.  And, we are happy to understand and accommodate those requirements on a needs basis.  These are details we would typically work out during the discovery and budgeting phase of the engagement.

<more on logging facilities available>



No comments yet. Be the first.

Maintenance - Policy and Procedures

Q:

Are there documented procedures to facilitate the implementation of the information system maintenance policy and associated system maintenance controls?

Are all information systems maintenance and repairs tracked, scheduled, reviewed and approved prior to implementation?

Are security controls verified following maintenance or repair actions?

Do you track, approve, control, monitor the use of, and maintain information system maintenance tools on an ongoing basis?

Do you check all media containing diagnostic and test programs for malicious code before the media is used in the information system?


A:

This is inherent to our regular mode of operations and procedures; see previous answers concerning change management and control, documentation and procedure; the same answers apply. ref: Omegabit Operations Wiki

Yes

Yes

Yes

Yes



No comments yet. Be the first.

Malicious Code and SPAM

Q:

Are there malicious code and SPAM protection mechanisms at information system entry and exit points (i.e. firewalls, electronic mail servers, web servers, proxy servers, and remote-access servers), and at workstations, servers, or mobile devices on the network to detect, prevent and eradicate malicious code and messages?

Are malicious code protection security controls centrally managed?

Are there intrusion detection and intrusion prevention monitoring security controls implemented?

Is SPAM protection centrally manage and information systems are automatically updated?


A:

Yes

Yes

Yes

Yes



No comments yet. Be the first.

Media Policy and Procedures

Q:

Do you have formal policy and procedures which document your media protection controls?

Do you use removable media for storing and processing client related data? If yes, do you mark each removable media in a manner indicating the distribution limitations, handling requirements, and applicable security markings of the information? Removable information system media include both digital media (e.g., diskettes, magnetic tapes, external/removable hard drives, flash/thumb drives, compact disks, digital video disks) and non-digital media (e.g., paper, microfilm).

Do you encrypt digital media or mobile devices (e.g., tapes, external/removable hard drives, CDs, DVDs, flash/thumb drives, laptops, tablets and etc.) containing Federal Reserve related data?


A:

Classification and handling varies by Client requirements. However, as it relates to the transmission of PII or other sensitive data, strong, modern cipher-based encryption is employed, and only using methods and under circumstances explicitly authorized by the Client. All physical media is labeled (except where intentionally obfuscated), serialized, and traceable. Electronic transmission is preferred.

Only when requested and approved by the Client and confirmed to be commensurate with operating restrictions and audit controls stipulated by the Client for specifically authorized individuals.

N/A; per Client requirements is supported.



No comments yet. Be the first.

Media Policy - Security and Restrictions

Q:

Do you have secure media transport policy and procedures?

Do you have media (both digital and non-digital) re-use, destruction and disposal policy and procedures?

Do you use mobile device? If yes, do you have a policy on mobile use, and can you remote wipe devices?

Do you restrict the use of unapproved external media attaching to organizational systems and network?


A:

ref: Omegabit IT Security document TOC, Part 1, Section 5 and 6

Yes, per NIST 800-88 r1 standards using certified commercial providers and documentation.

Yes. All mobile communications take place via secure channels and sensitive information is stored in encrypted format. Most sensitive information is intentionally centralized on secure servers. All mobile device data is encrypted. Devices are wiped or physically destroyed before retirement or change of ownership using industry-approved sanitization methods. Mobile devices with access to sensitive information can be remotely wiped.

Yes, Omegabit follows strict policies concerning the introduction of unauthorized hardware, and also operates using encryption and remote access standards and controls that pre-assume that every human-accessible node not protected by secure facilities controls (e.g., regular office and admin workstations), are at risk to all network entities, and are hardened by default as if operating on an uncontrolled public network; meaning, not even internal LAN network communications are considered "trusted" except under the cloak of encrypted channels, systemically. The exception is with cloud infrastructure that is intentionally configured for clear-channel communications between localized and otherwise hardened and protected nodes via dedicated isolated linkages, for performance (e.g. VMWare control and HA communications).



No comments yet. Be the first.