My WebLink
|
Help
|
About
|
Sign Out
Home
Browse
Search
2022-02-28-minutes-it-study-session
>
Meetings
>
2022
>
03. March
>
2022-03-15 10:00 AM - Commissioners' Agenda
>
2022-02-28-minutes-it-study-session
Metadata
Thumbnails
Annotations
Entry Properties
Last modified
3/10/2022 1:48:55 PM
Creation date
3/10/2022 1:47:06 PM
Metadata
Fields
Template:
Meeting
Date
3/15/2022
Meeting title
Commissioners' Agenda
Location
Commissioners' Auditorium
Address
205 West 5th Room 109 - Ellensburg
Meeting type
Regular
Meeting document type
Supporting documentation
Supplemental fields
Alpha Order
a
Item
Approve Minutes
Order
1
Placement
Consent Agenda
Row ID
87183
Type
Minutes
There are no annotations on this page.
Document management portal powered by Laserfiche WebLink 9 © 1998-2015
Laserfiche.
All rights reserved.
/
29
PDF
Print
Pages to print
Enter page numbers and/or page ranges separated by commas. For example, 1,3,5-12.
After downloading, print the document using a PDF reader (e.g. Adobe Reader).
View images
View plain text
<br /> 5 <br />• Summary of incident <br />• Summary of any confirmed actions taken (by CI and/or <br />Customer) <br />• Final status and/or resolution <br /> <br />Monthly Activity Report: <br />• Published by the 15th of month <br />• Security Events Generated <br />• Investigations Completed <br />• Confirmed Severe Incidents (IAPs Issued) <br />• Security events to include: <br />• Intrusion detection signatures <br />• Reputation matches <br />• Anomalous traffic identification <br />• Threat hunting findings <br />• Additional detail for critical assets and highest volume <br />events <br /> <br />Continuous <br />Vulnerability <br />Identification <br />(CI-CVI) <br />• Automatically conducts internal network vulnerability scans at <br />Customer-defined frequencies and IP scopes(s) <br />• Identifies insecure configurations, open ports and services, <br />vulnerable software/service versions, and missing patches <br />• Generates reports with steps to eliminate each vulnerability, as well <br />as risk via CVSS scores to allow prioritization of remediation efforts <br />• Populates a web dashboard to view statistics, visualizations, and <br />results <br />• Tabular Results <br />• Graphical representation of time-based trends for newly <br />identified vulnerabilities and for remediated vulnerabilities <br /> <br />Log Retention <br />(CI-LR) <br />• CI saves logs as indicated by Customer <br />• CI hashes and encrypts logs to enable Customer to verify that they <br />are secure and unchanged <br />• CI will gather and return logs according to search criteria (limited to <br />source and date) specified by Customer, when requested <br /> <br /> <br />
The URL can be used to link to this page
Your browser does not support the video tag.