
PRIVATE AND CONFIDENTIAL
Attachment – Applications
- Applications hosted by Customer (On-Premises)
- Server Management
- Access to the server will be required for management
- Active Directory Domain Admin Account (where applicable)
- Local Administrator Account
- Application Admin Account
- Server Rack Key Access
- RDP Access
- Application Management
- Application knowledge based should be provided by Application Provider
- Application APIs should be made available by Application Provider
- Security Management
- Role Based Access Control where Application allows.
- Endpoint Protection should be installed on the server hosting the application.
- Patches and Upgrades should be performed monthly.
- Audit and Syslogging should be enabled where Application allows
- Backup and Restoration
- Daily/Weekly Backups should be enabled.
- Offsite backups should be enabled.
- Application Support
- Licenses with Application Provider should be valid and renewed.
- Application invoices should be retained for license validation.
- Contact email and number should be available for support escalations.
- Applications hosted by Customer (Cloud)
- Server Management
- Access to the cloud server will be required for management
- Local Administrator Account
- Application Admin Account
- RDP Access
- Application Management
- Application knowledge based should be provided by Application Provider
- Application APIs should be made available by Application Provider
- Security Management
- Role Based Access Control where Application allows.
- Endpoint Protection should be installed on the server hosting the application.
- Patches and Upgrades should be performed monthly.
- Audit and Syslogging should be enabled where Application allows
- Backup and Restoration
- Daily/Weekly Backups should be enabled.
- Offsite backups should be enabled.
- Application Support
- Licenses with Application Provider should be valid and renewed.
- Application invoices should be retained for license validation.
- Contact email and number should be available for support escalations.
- Applications hosted by 3rd-Party (On-Premises)
- Server Management
- Access to the server will be managed by 3rd Party
- Access will be granted to 1Cyber on case-by-case basis as required through escalation.
- Application Management
- Application will be managed by 3rd Party.
- Security Management
- Role Based Access Control will be managed by 3rd Party.
- Endpoint Protection will be managed by 3rd Party.
- Patches and Upgrades will be managed by 3rd Party.
- Audit and Syslogging will be managed by 3rd Party.
- Backup and Restoration
- Daily/Weekly Backups will be managed by 3rd Party.
- Offsite backups will be managed by 3rd Party.
- Application Support
- Licenses with Application Provider should be valid and renewed.
- Application invoices should be retained for license validation.
- Contact email and number should be available for support escalations.
- Applications hosted by 3rd-Party (Cloud)
- Application Management
- Application knowledge based should be provided by Application Provider
- Application APIs should be made available by Application Provider
- Security Management
- Role Based Access Control where Application allows.
- Endpoint Protection will be managed by Application Provider.
- Patches and Upgrades will be managed by Application Provider.
- Audit and Syslogging will be managed by Application Provider.
- Backup and Restoration
- Daily/Weekly Backups will be managed by Application Provider.
- Offsite backups will be managed by Application Provider.
- Application Support
- Licenses with Application Provider should be valid and renewed.
- Application invoices should be retained for license validation.
- Contact email and number should be available for support escalations.