Professional Documents
Culture Documents
4. What logging and monitoring capabilities does the firewall have (e.g., event logging, real-
time monitoring, reporting)?
Traffic Monitoring
1. Could you describe the details about the access control policies in place, including the
authentication and authorization mechanisms and technologies used to control access to
network resources.
Request or authorization needs to be made from the campus manager or directly from
the director.
2. What authentication methods are used on the network?
Single Sign on passwords
VPN credentials for remote users
Multi Factor Authentication app and text/call for Office 365
3. How are user credentials managed and stored?
They are generally not stored, if required, in encrypted tech notes.
4. What measures are in place to prevent unauthorized access to user accounts?
User MFA
Audit logs both for Office 365 and Server to tracking or tracing if certain user account
have been accessed/compromised.
Security assessments:
1. Can you provide information about any security assessments that have been conducted
on the network, including vulnerability scans and penetration testing.
2. Could you describe the process of vulnerability identification and risk treatment within
the Acsenda network security system?
3. What kind of procedures are applied in order to handle a cybersecurity crisis?
Investigate Extent of Breach using Audit logs and forensic tools
Scan for Malware on affected devices
Delete affected files and wipe affected devices.
Restore from backup.
Get all systems back up to normal operation state.
4. Describe the process of how an Acsenda responds when faced with a major security
incident.
Identify critical assets.
Identify the attack/nature of the incident.
Contain infection points and disconnect them from the network.
1. Can you provide information about the backup, redundancy, and recovery plan to ensure
the availability and integrity of the critical network, data, and functionality in the event of
a disaster or disruption.
2. Could you describe the recovery plan for Acsenda, to bring the system back to normal
with minimal impact/disruption
With network outage
3. What backup and disaster recovery processes are in place for the network?
ISP redundancy, Shaw and Telus
Spare Router devices available, ready to pre-load the routine router configuration
backup and deployed as a temporary replacement.
File and Server backup Redundancy via Cloud, Off-Host Local Backup
UPS for any Unexpected power outage/surge relating to critical equipment.