|
|
|
|
|
|
|
|
|
|
|
|
||||||||||
13/12/2006 |
|
Safe |
Chubb |
Europe |
SN |
PKI DC |
|
5000 |
|
OWI |
20/12/2006 |
|
HSM |
nCipher |
netHSM |
|
PKI DC |
|
11000 |
|
OWI |
30/9/2007 |
|
HSM |
nCipher |
netHSM |
|
PKI DC |
|
11000 |
|
OWI |
14/1/2007 |
|
Server |
UK |
APW |
|
PKI DC |
|
1238 |
|
OWI |
01/01/2005 |
|
2 |
|
|
|
PKI DC |
|
|
|
OWI |
01/01/2005 |
|
|
Somke |
Fire |
NA |
PKI DC |
|
120 |
|
OWI due |
01/01/2005 |
|
Fire |
Fike |
FM 200 |
341861.2 |
PKI DC |
|
15000 |
|
OWI due |
01/01/2005 |
|
Air |
Clivet |
VR-DX |
|
PKI DC |
|
20000 |
|
OWI due |
01/12/2006 |
|
Backup |
YOKO |
|
HKA |
PKI DC |
|
300 |
|
OWI due |
01/01/2005 |
|
Light |
|
|
|
PKI DC |
|
|
|
OWI |
01/12/2006 |
|
Door |
Alpro |
NA |
NA |
PKI DC |
|
2000 |
|
OWI due |
13/12/2006 |
|
Door |
Trimec |
TS2001 |
NA |
PKI DC |
|
456 |
|
OWI due |
|
||||||||||
08/01/2007 |
|
Server |
Dell |
PE2950 |
CBXGK2J |
PKI DC |
|
1814 |
|
OWI |
08/01/2007 |
|
Server |
Dell |
PE2950 |
9WCHK2J |
PKI DC |
|
1814 |
|
OWI |
08/01/2007 |
|
Server |
HP |
|
|
PKI DC |
|
1814 |
|
OWI |
08/01/2007 |
|
Server |
HP |
|
|
PKI DC |
|
1814 |
|
OWI |
13/12/2006 |
|
Switch |
Cisco |
|
|
PKI DC |
|
817 |
|
OWI |
13/12/2006 |
|
|
|
X505 |
|
PKI DC |
|
13973 |
|
OWI |
|
|
KBM |
N/C |
N/C |
N/C |
N/C |
N/C |
N/C |
N/C |
N/C |
|
|
KBM |
N/C |
N/C |
N/C |
N/C |
N/C |
N/C |
N/C |
N/C |
01/01/2005 |
|
2 |
|
|
|
PKI DC |
|
|
|
OWI |
01/01/2005 |
|
2 |
|
|
|
PKI DC |
|
|
|
OWI |
01/01/2005 |
|
2 |
|
|
|
PKI DC |
|
|
|
OWI |
13/12/2006 |
|
Server |
UK |
APW |
47170 |
PKI DC |
|
1238 |
|
OWI |
13/12/2006 |
|
Server |
UK |
APW |
47166 |
PKI DC |
|
1238 |
|
OWI |
01/01/2005 |
|
Fire |
Fike |
FM 200 |
341861.2 |
PKI DC |
|
15000 |
|
|
01/01/2005 |
|
|
Somke |
Fire |
NA |
PKI DC |
|
15000 |
N/C |
N/C |
13/12/2006 |
|
Motion |
Texecom |
Mirage |
NA |
PKI DC |
|
33 |
|
|
01/01/2005 |
|
Light |
|
|
|
PKI DC |
|
|
|
OWI |
01/01/2005 |
|
Air |
Clivet |
VR-DX |
|
PKI DC |
|
20000 |
|
|
01/01/2005 |
|
Backup |
YOKO |
|
HKA |
PKI DC |
|
300 |
|
|
13/12/2006 |
|
CCTV |
|
|
63121040 |
PKI DC |
|
285 |
|
|
13/12/2006 |
|
Door |
Alpro |
NA |
NA |
PKI DC |
|
2000 |
|
|
13/12/2006 |
|
Door |
Trimec |
TS2001 |
0 |
PKI DC |
|
456 |
|
|
|
||||||||||
13/12/2006 |
|
Access |
Identix |
V20 UA |
390600348 |
PKI DC |
|
2520 |
|
|
13/12/2006 |
|
Access |
Identix |
V20 UA |
30700024 |
PKI DC |
|
2520 |
|
|
13/12/2006 |
|
Access |
Identix |
V20 UA |
500303254 |
PKI DC |
|
2520 |
|
|
13/12/2006 |
|
DVR |
|
|
61210298 |
PKI DC |
|
477 |
|
|
01/12/2006 |
|
Remote |
|
|
|
PKI DC |
|
25 |
|
|
13/12/2006 |
|
Monitor |
|
|
6300145 |
PKI DC |
|
117 |
|
OWI |
01/12/2006 |
|
Coaxial |
|
|
|
PKI DC |
|
|
|
OWI |
13/12/2006 |
|
PC |
Acer |
Veriton |
|
PKI DC |
|
405 |
|
OWI |
00/01/1900 |
|
|
Acer |
|
|
PKI DC |
|
35 |
|
OWI |
00/01/1900 |
|
Mouse |
Acer |
Mouse |
|
PKI DC |
|
10 |
|
OWI |
13/12/2006 |
|
Monitor |
Acer |
AC713B |
|
PKI DC |
|
125 |
|
OWI |
13/12/2006 |
|
Switch |
SMC |
|
|
PKI DC |
|
|
|
OWI |
13/12/2006 |
|
Door |
Trimec |
TS2001 |
NA |
PKI DC |
|
456 |
|
|
13/12/2006 |
|
Exit |
ALPRO |
NA |
NA |
PKI DC |
|
88 |
|
|
13/12/2006 |
|
Power |
|
12V 5 |
NA |
PKI DC |
|
116 |
|
OWI |
13/12/2006 |
|
Alarm |
Veritas |
Excel |
NA |
PKI DC |
|
74 |
|
|
13/12/2006 |
|
LCD |
Texecom |
Premier |
NA |
PKI DC |
|
50 |
|
|
13/12/2006 |
|
Dialer |
Texecom |
Speech |
NA |
PKI DC |
|
63 |
|
|
13/12/2006 |
|
Siren |
Texecom |
Odyssey |
NA |
PKI DC |
|
18 |
|
|
13/12/2006 |
|
CCTV |
|
|
63121034 |
PKI DC |
|
285 |
|
|
14/12/2006 |
|
Fully |
|
|
|
PKI DC |
|
|
|
|
13/12/2006 |
|
Access |
Identix |
V20 UA |
|
PKI DC |
|
2520 |
|
|
13/12/2006 |
|
|
Khind |
EM2004G |
|
|
|
|
|
|
|
||||||||||
13/12/2006 |
|
Server |
UK |
APW |
0 |
Juffair |
|
1238 |
|
OWI |
08/01/2007 |
|
Server |
Dell |
PE2950 |
41WHK2J |
Juffair |
|
1814 |
|
OWI |
08/01/2007 |
||||||||||
13/12/2006 |
|
Switch |
Cisco |
|
|
Juffair |
|
817 |
|
OWI |
13/12/2006 |
|
|
|
X505 |
|
Juffair |
|
13973 |
|
OWI |
|
|
KBM |
|
|
|
Juffair |
|
|
|
OWI |
|
|
KBM |
|
|
|
Juffair |
|
|
|
OWI |
01/01/2005 |
|
Network |
|
|
|
Juffair |
|
|
|
OWI |
01/01/2005 |
|
Fire |
EMI |
AFA |
NA |
Juffair |
|
|
|
|
01/01/2005 |
|
|
EMI |
Fire |
NA |
Juffair |
|
|
|
|
01/01/2005 |
|
Light |
|
|
|
Juffair |
|
|
|
|
01/01/2005 |
|
Air |
Denco |
DM5 |
NA |
Juffair |
|
|
|
|
01/01/2005 |
|
Backup |
Pearl |
|
800390 |
Juffair |
|
|
|
|
The Information Security Manager is the owner of this document and is responsible for ensuring that it is maintained by the relationship owners
This document was issued by the Information Security Manager on 08 November, 2007 and is issued on a version controlled basis.
Adlin Hisyamuddin
Information Security Manager
____________________________
On:
08 November, 2007
____________________________
Change history
Issue 1 08 November, 2007 Initial issue
|
|
|
|
|
|
|
|
|
|
|
|
||||||||||
14/01/2007 |
|
OS |
Microsoft |
Windows Server 2003 |
1 |
PKI DC |
|
|
|
|
20/09/2007 |
|
OS |
RedHat |
Enterprise Linux 5 |
3 |
PKI DC |
|
|
|
|
07/10/2007 |
|
Digi-CA™ |
Digi-Sign |
Xp |
1 |
PKI DC |
|
97,000 |
|
|
|
||||||||||
14/01/2007 |
|
Access Control |
Identix |
4.6.1.0 |
1 |
PKI DC |
|
|
|
|
14/01/2007 |
|
CCTV control |
Infinova |
V.1.00.09 |
1 |
PKI DC |
|
|
|
|
14/01/2007 |
|
OS |
Microsoft |
XP Pro |
1 |
PKI DC |
|
|
|
|
15/01/2007 |
|
AntiVirus |
Trend Micro |
OfficeScan 8.0 |
1 |
PKI DC |
|
|
|
|
|
||||||||||
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
||||||||||
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
||||||||||
20/09/2007 |
|
OS |
RedHat |
Enterprise Linux 5 |
2 |
PKI DC |
|
|
|
|
|
|
SMTP |
Microsoft |
Exchange 2003 |
1 |
Juffair |
|
|
|
|
|
|
DNS (*.gov.bh) |
RedHat |
Enterprise Linux 4 |
1 |
Juffair |
|
|
|
|
|
|
DNS (*.gdn) |
Microsoft |
Windows Server 2003 |
1 |
Juffair |
|
|
|
|
The Information Security Manager is the owner of this document and is responsible for ensuring that it is maintained by the relationship owners
This document was issued by the [Information Security Manager] on [date] and is issued on a version controlled basis.
Adlin Hisyamuddin
Information Security Manager
____________________________
On:
08 November, 2007
____________________________
Change history
Issue 1 08 November, 2007 Initial issue
|
|
|
|
|
|
|
|
|
|
|
|||||||||
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|||||||||
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|||||||||
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|||||||||
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|||||||||
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
The [Information Security Manager] is the owner of this document and is responsible for ensuring that it is maintained by the relationship owners
This document was issued by the [Information Security Manager] on [date] and is issued on a version controlled basis.
Signature: Date:
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
The [Information Security Manager] is the owner of this document and is responsible for ensuring that it is maintained by the relationship Owners
This document was issued by the [Information Security Manager] on [date] and is issued on a version controlled basis.
Adlin Hisyamuddin
Information Security Manager
____________________________
On:
08 November, 2007
____________________________
Change history
Issue 1 08 November, 2007 Initial issue
External Parties: Information Security Procedure
According to DOC 6.8 / DOC 6.8 of this Manual, the Organization maintains the security of its information processing facilities and information assets in relation to external parties. All external parties who need to access any Organizational information assets are subject to this procedure. The Organization has (or may have) external party agreements with the following categories of organizations, all of whom are covered by this procedure; risks may be assessed for external parties as individual organizations or as categories, depending on the level of risk involved:
a) Service providers
b) Managed security services
c) Customers
d) Outsourcing suppliers (facilities, operations, IT systems, data collection, call centres, others)
e) Consultants and auditors
f) Developers and suppliers of IT systems and services
g) Cleaning, catering and other outsourced support services
h) Temporary personnel, placement and other (casual) short-term appointments
a) The information processing facilities and information assets the external party will access;
b) The type of access the third party will have – physical access and/or logical access (identifying the assets that will be accessed), whether the access is taking place on-site or off-site and the exact location from which access will be made;
c) The value and classification (see sub section 7.2 of the Manual) of the information that will be accessed;
d) The information assets that the external party are not intended to access and which may required additional controls to secure;
e) The external party’s personnel (see sub section 8.1 of the Manual), including their contractors and partners, who will or might be involved;
f) How external party personnel are to be authenticated (see Section 11 of the Manual);
g) How the external party will process, communicate and store information;
h) The impact to the external party of access not being available when required, or of inaccurate or misleading information being entered, received or shared;
i) How the Organization’s information security incident management procedure (see Section 13 of the Manual) will be extended to incorporate information security incidents involving the external party;
j) Any legal, regulatory or other contractual issues that should be taken into account with respect to the external party;
k) How the interests of other stakeholders might be affected by any decisions.
a) The information security policy (sub section 5.1.1 of the Manual);
b) The controls identified as required through the risk assessment process (see 4), which may include procedures and technical controls;
c) A clear definition and/or description of the product or service to be provided, and a description of information (including its classification) to be made available;
d) Requirements for user and administrator education, training and awareness (see sub section 8.2.2 of the Manual);
e) Provisions for personnel transfer;
f) Description of responsibilities regarding software and hardware installation, maintenance and de-commissioning;
g) Clearly defined reporting process, reporting structure, reporting formats, escalation procedures and the requirement for the external party to adequately resource the compliance, monitoring and reporting activities;
h) A specified change management process (see sub section 10.1.2 in the Manual);
i) Physical controls, including secure perimeters (see Section 9 of the Manual);
j) Controls against malware (see sub section 10.4 of the Manual);
k) Access control policy (see Section 11 of the Manual);
l) Information security incident management (see Section 13 of the Manual) and agreement violation management procedures;
m) The target level for service and security, unacceptable service and security levels, definition of verifiable performance and security criteria, monitoring and reporting;
n) The right to monitor and audit performance (including of the third party’s processes for change management, vulnerability identification and information security incident management), to revoke activities, and to use external auditors;
o) Service continuity requirements;
p) Liabilities on both sides, legal responsibilities and how legal responsibilities (including data protection and privacy) are to be met;
q) The protection of IPR and copyright;
r) Controls over any allowed sub-contractors;
s) Conditions for termination/re-negotiation of agreements, including contingency plans.
The Information Security Manager is the owner of this document and is responsible for ensuring that this procedure is reviewed in line with the review requirements of the ISMS.
A current version of this document is available to PKI team members of staff on the corporate intranet.
This procedure was approved by the Information Security Manager on 08 November, 2007 and is issued on a version controlled basis under his signature
Adlin Hisyamuddin
Information Security Manager
____________________________
On:
08 November, 2007
____________________________
Change history
Issue 1 08 November, 2007 Initial issue