SlideShare a Scribd company logo
1 of 4
Download to read offline
WHITE PAPER




                                                      Windstream’s Position on Security Compliance


   Compliance In General                              Our customers are under increasing                                       Government Mandated Privacy Acts
                                                      pressure to adhere to numerous security                                  (Massachusetts, California, and
                                                      compliance standards and design                                          Minnesota, with others to follow) –
                                                      networks that address the best practices                                 Applies to anyone doing business in
                                                      associated with these standards. As                                      these states
                                                      any healthcare provider can tell you, the                                Health Insurance Portability and
                                                      content of the standards themselves can                                  Accountability Act (HIPAA) –
                                                      be daunting to understand and apply,                                     Applies to the healthcare vertical
                                                      which has driven organizations to look                                   Gramm-Leach-Bliley Act (GLBA) –
                                                      outside for assistance.                                                  Applies to the financial vertical
                                                                                                                               Sarbanes-Oxley Act (SOX) –
                                                      Top Five Industry Compliance                                             Applies to public companies
                                                      Standards

                                                         Payment Card Industry Digital Security
                                                         Standard (PCI DSS) – Applies to any
                                                         company processing, transporting, or
                                                         storing credit card information



   Overview of Standards                              PCI DSS – The goal of PCI DSS                                         1, 2010. It applies generally to those
                                                      is to create a framework for good                                     businesses that own or license personal
                                                      security practice around the handling                                 information about Massachusetts
                                                      of cardholder data. A PCI-compliant                                   residents. Personal information includes
                                                      operating environment is one in which                                 Massachusetts residents’ first and last
                                                      the cardholder data exists (i.e., it does                             names, or first initials and last names, in
                                                      NOT refer to the whole corporate                                      combination with any of the following:
                                                      network), and PCI DSS defines the                                      Social Security number, driver’s license
                                                      requirements for how access to this data                              number or state-issued identification
                                                      must be controlled, monitored, logged,                                card number, financial account
                                                      and audited.                                                          number, or credit or debit card number.
                                                                                                                            Therefore, if you have any employees,
                                                      Government Mandated Privacy Acts                                      receive payments from individuals
                                                      (Massachusetts) – The Massachusetts                                   (whether by check or credit card), or
                                                      Data Privacy Act (201 CMR 17), now                                    send out 1099s, your business owns or
                                                      recently revised, went into effect March                              licenses personal information and, thus,



                                                                                                                                                                 © Windstream 2012




    DATE: 3.27.12 | REVISION: 2 | 009574_Windstream’s_Position | CREATIVE: MF | JOB#: 9574 - Windstream’s Position on Security Compliance | COLOR: GS | TRIM: 8.5” x 11”
WHITE PAPER




    Overview of Standards    must comply with the law. Minnesota      applies to information of any consumers
                   (Cont.)   and California recently passed similar   past or present of the financial
                             laws and it’s expected that this trend   institution’s products or services.)
                             will continue for the remaining 47       This plan must include:
                             states in the near future.                 Denoting at least one employee to
                                                                        manage the safeguards
                             HIPAA – HIPAA covers a number of           Constructing thorough risk
                             healthcare standards, one of which         management on each department
                             is the HIPAA Security Rule, which          handling the non-public information
                             requires implementation of three types     Developing, monitoring, and testing a
                             of safeguards:                             program to secure the information
                                                                        Modifying the safeguards as needed
                               Administrative                           with the changes in how information is
                               Physical                                 collected, stored, and used
                               Technical
                                                                      This rule is intended to do what most
                             In addition, it imposes other            businesses should already be doing:
                             organizational requirements and          protecting their clients. The Safeguards
                             a need to document processes             Rule forces financial institutions to
                             analogous to the Privacy Rule.           take a closer look at how they manage
                             Implementing within and adhering         private data and to do a risk analysis
                             to this rule is extremely difficult due   on their current processes. No process
                             to the highly technical nature of the    is perfect, so this has meant that every
                             contents of the rule.                    financial institution has had to make
                                                                      some effort to comply with the GLBA.
                             GLBA – The Safeguards Rule,
                             a part of the GLB Act, requires          SOX – The impact of IT security within
                             financial institutions to develop a       SOX is somewhat indirect since the law
                             written information security plan        is primarily focused on the accuracy of
                             that describes how the company is        financial reporting data. IT security is
                             prepared for, and plans to continue to   important under SOX only to the extent
                             protect clients’ non-public personal     that it enhances the reliability and
                             information. (The Safeguards Rule        integrity of that reporting.




                                                                                              © Windstream 2012
WHITE PAPER




Windstream’s Strategy Around   The Internet Service Provider (ISP)         10. Continuous Vulnerability Assessment
                 Compliance    has an interesting role in compliance.          and Remediation
                               Since the essential underlying focus of     11. Account Monitoring and Control
                               popular compliance standards today          12. Malware Defenses
                               is on individual enterprise context, it’s   13. Limitation and Control of Network
                               impossible for Windstream to provide            Ports, Protocols, and Services
                               “instant on” compliance. However, with      14. Wireless Device Control
                               our Security Consultation services, as      15. Data Loss Prevention
                               well as the best practices that we’ve       16. Secure Network Engineering
                               implemented internally and consult          17. Penetration Tests and Red Team
                               our customers to follow, Windstream             Exercises
                               has made it as easy as possible for         18. Incident Response Capability
                               customers from all verticals to meet and    19. Data Recovery Capability
                               exceed the standards laid out for them      20. Security Skills Assessment and
                               by the various regulatory bodies. Each          Appropriate Training to Fill Gaps
                               compliance standard is built around a
                               foundation of concepts best outlined        Furthermore, Windstream is actively
                               by the SANS Institute and mirrored by       taking advantage of the SAS 70 auditing
                               Windstream’s business best practices.       process to provide customers with the
                               They include:                               necessary information to inform their
                                                                           auditors and planners of compliance-
                               1. Inventory of Authorized and              friendly topologies and practices. A
                                  Unauthorized Devices                     SAS 70 is performed by a third party
                               2. Inventory of Authorized and              that reviews our security controls, then
                                  Unauthorized Software                    verifies that we’re adhering to them by
                               3. Secure Configurations for Hardware        reviewing, auditing, and scoring our
                                  and Software on Laptops,                 performance. Since our customers are
                                  Workstations, and Servers                under a myriad of compliance standards,
                               4. Secure Configurations for Network         we developed our controls based upon
                                  Devices such as Firewalls, Routers,      the best practices mentioned above
                                  and Switches                             and mapped our practices to PCI
                               5. Boundary Defense                         DSS and other compliance standards.
                               6. Maintenance, Monitoring, and             This way, we can present our SAE
                                  Analysis of Audit Logs                   16 documentation to any customer
                               7. Application Software Security            who needs to prove that Windstream
                               8. Controlled Use of Administrative         practices security standards which
                                  Privileges                               exceed the compliance standards to
                               9. Controlled Access Based on Need          which they’re being held. This approach
                                  to Know                                  makes the most sense for both
                                                                           Windstream and our customers.




                                                                                                   © Windstream 2012
WHITE PAPER




         Things We’re Watching &   Since Windstream’s role is central to      there are a number of best practices
               What We’re Doing    customer network security, we as an ISP    and technologies that we’re focusing
                                   and Managed Security Service Provider      on to control access, then monitor and
                                   (MSSP) must be “ahead of the curve” to     equip zones within the organization with
                                   maintain our position within the confines   legitimate access to these services to
                                   of the popular compliance standards        properly handle threats.
                                   because the overwhelming buying
                                   triggers for our services surround these   Enclaving – There is no ‘silver bullet’ in
                                   standards. We see emerging threats and     security. If there were, this multi-billion
                                   general business practices that require    dollar industry would not exist. Given
                                   review and standards application on a      that reality, it’s becoming increasingly
                                   regular basis.                             more prudent to design networks
                                                                              (LAN and WAN) that are zoned (or
                                   Top Three Emerging Trends                  enclaved) in such a way that in the
                                                                              event of a successful attack or breach,
                                     Best practices surrounding safe and      the impact to the organization as a
                                     secure utilization of social media       whole is minimized. As threats grow in
                                     Best practices incorporating enclaving   complexity, best practices around this
                                     of network elements to reduce the        concept are increasing in value.
                                     impact of a breach or incident
                                     Best practices surrounding the           Mobile Devices – Innovation and
                                     deployment, control, and risk            incorporation of mobile devices is
                                     mitigation associated with mobile        skyrocketing across all industries. Mobile
                                     technology (Android, iPad, iPhone,       device security, as a result, is becoming
                                     WiFi, etc.)                              a targeted focus for our customers and
                                                                              our organization. The development of
                                   Social Media – Malware and bot-net         best practices and the deployment
                                   threats are synonymous with social         of security technology with a focus
                                   media. While it’s a well known best        on mobile device risk reduction and
                                   practice to develop Web acceptable         mitigation is a top priority at Windstream.
                                   use policies that block access to
                                   these services, an increasing number
                                   of organizations use social media
                                   as an advertising and information
                                   distribution outlet. With this trend,




009574 | 3/12                                                                                            © Windstream 2012

More Related Content

What's hot

Interlace bfsi
Interlace bfsiInterlace bfsi
Interlace bfsiInterlace
 
SAS Forum India: Big Data, Big Analytics & Bad Behaviour - Fighting Financial...
SAS Forum India: Big Data, Big Analytics & Bad Behaviour - Fighting Financial...SAS Forum India: Big Data, Big Analytics & Bad Behaviour - Fighting Financial...
SAS Forum India: Big Data, Big Analytics & Bad Behaviour - Fighting Financial...SAS Institute India Pvt. Ltd
 
IBM Banking: Automated Systems help meet new Compliance Requirements
IBM Banking: Automated Systems help meet new Compliance RequirementsIBM Banking: Automated Systems help meet new Compliance Requirements
IBM Banking: Automated Systems help meet new Compliance RequirementsIBM Banking
 
Making Executives Accountable for IT Security
Making Executives Accountable for IT SecurityMaking Executives Accountable for IT Security
Making Executives Accountable for IT SecuritySeccuris Inc.
 
Asset 1 security-in-the-cloud
Asset 1 security-in-the-cloudAsset 1 security-in-the-cloud
Asset 1 security-in-the-clouddrewz lin
 
Data Security Regulatory Lansdcape
Data Security Regulatory LansdcapeData Security Regulatory Lansdcape
Data Security Regulatory LansdcapeBrian Bauer
 
ENHANCING INFRASTRUCTURE SECURITY IN REAL ESTATE
ENHANCING INFRASTRUCTURE SECURITY IN REAL ESTATEENHANCING INFRASTRUCTURE SECURITY IN REAL ESTATE
ENHANCING INFRASTRUCTURE SECURITY IN REAL ESTATEIJNSA Journal
 

What's hot (10)

task 1
task 1task 1
task 1
 
Interlace bfsi
Interlace bfsiInterlace bfsi
Interlace bfsi
 
SAS Forum India: Big Data, Big Analytics & Bad Behaviour - Fighting Financial...
SAS Forum India: Big Data, Big Analytics & Bad Behaviour - Fighting Financial...SAS Forum India: Big Data, Big Analytics & Bad Behaviour - Fighting Financial...
SAS Forum India: Big Data, Big Analytics & Bad Behaviour - Fighting Financial...
 
IBM Banking: Automated Systems help meet new Compliance Requirements
IBM Banking: Automated Systems help meet new Compliance RequirementsIBM Banking: Automated Systems help meet new Compliance Requirements
IBM Banking: Automated Systems help meet new Compliance Requirements
 
Making Executives Accountable for IT Security
Making Executives Accountable for IT SecurityMaking Executives Accountable for IT Security
Making Executives Accountable for IT Security
 
Asset 1 security-in-the-cloud
Asset 1 security-in-the-cloudAsset 1 security-in-the-cloud
Asset 1 security-in-the-cloud
 
Data Security Regulatory Lansdcape
Data Security Regulatory LansdcapeData Security Regulatory Lansdcape
Data Security Regulatory Lansdcape
 
Managing Information Asset Register
Managing Information Asset RegisterManaging Information Asset Register
Managing Information Asset Register
 
Breached! The First 48
Breached! The First 48Breached! The First 48
Breached! The First 48
 
ENHANCING INFRASTRUCTURE SECURITY IN REAL ESTATE
ENHANCING INFRASTRUCTURE SECURITY IN REAL ESTATEENHANCING INFRASTRUCTURE SECURITY IN REAL ESTATE
ENHANCING INFRASTRUCTURE SECURITY IN REAL ESTATE
 

Similar to White Paper: Windstream's Position on Security Compliance

Pci compliance without compensating controls how to take your mainframe out ...
Pci compliance without compensating controls  how to take your mainframe out ...Pci compliance without compensating controls  how to take your mainframe out ...
Pci compliance without compensating controls how to take your mainframe out ...Ulf Mattsson
 
Security Compliance Models- Checklist v. Framework
Security Compliance Models- Checklist v. FrameworkSecurity Compliance Models- Checklist v. Framework
Security Compliance Models- Checklist v. FrameworkDivya Kothari
 
PCI Compliance Report
PCI Compliance ReportPCI Compliance Report
PCI Compliance ReportHolly Vega
 
Verizon 2014 pci compliance report
Verizon 2014 pci compliance reportVerizon 2014 pci compliance report
Verizon 2014 pci compliance reportBee_Ware
 
Verizon 2014 PCI Compliance Report
Verizon 2014 PCI Compliance ReportVerizon 2014 PCI Compliance Report
Verizon 2014 PCI Compliance Report- Mark - Fullbright
 
How to Prepare for a PCI DSS Audit
How to Prepare for a PCI DSS AuditHow to Prepare for a PCI DSS Audit
How to Prepare for a PCI DSS AuditSecurityMetrics
 
Data Sheet For Erg
Data Sheet For ErgData Sheet For Erg
Data Sheet For Ergmjschreck
 
CHAPTER 3 Security Policies and Regulations In this chap
CHAPTER 3 Security Policies and Regulations In this chapCHAPTER 3 Security Policies and Regulations In this chap
CHAPTER 3 Security Policies and Regulations In this chapEstelaJeffery653
 
Best Practices to Protect Cardholder Data Environment and Achieve PCI Compliance
Best Practices to Protect Cardholder Data Environment and Achieve PCI ComplianceBest Practices to Protect Cardholder Data Environment and Achieve PCI Compliance
Best Practices to Protect Cardholder Data Environment and Achieve PCI ComplianceRapid7
 
Jelecos: Achieving Compliance with Axcient
Jelecos: Achieving Compliance with AxcientJelecos: Achieving Compliance with Axcient
Jelecos: Achieving Compliance with AxcientErin Olson
 
Privacy and security insurance coverage relates to pci (payment card industry...
Privacy and security insurance coverage relates to pci (payment card industry...Privacy and security insurance coverage relates to pci (payment card industry...
Privacy and security insurance coverage relates to pci (payment card industry...The Harvey Company Insurance Services
 
PCI DSS Reaper - Are you ready - VIMRO
PCI DSS Reaper - Are you ready - VIMROPCI DSS Reaper - Are you ready - VIMRO
PCI DSS Reaper - Are you ready - VIMROFitCEO, Inc. (FCI)
 
2015 09-22 Is it time for a Security and Compliance Assessment?
2015 09-22 Is it time for a Security and Compliance Assessment?2015 09-22 Is it time for a Security and Compliance Assessment?
2015 09-22 Is it time for a Security and Compliance Assessment?Raffa Learning Community
 
Law firm information security overview focus on encryption by dave cunningh...
Law firm information security overview   focus on encryption by dave cunningh...Law firm information security overview   focus on encryption by dave cunningh...
Law firm information security overview focus on encryption by dave cunningh...David Cunningham
 
MA 201 CMR 17.00 Personal Identity Security
MA 201 CMR 17.00 Personal Identity SecurityMA 201 CMR 17.00 Personal Identity Security
MA 201 CMR 17.00 Personal Identity SecurityArpin Consulting
 
Fdic ffiec cyber_security_assessments
Fdic ffiec cyber_security_assessmentsFdic ffiec cyber_security_assessments
Fdic ffiec cyber_security_assessmentsKen M. Shaurette
 
When does a company need to be PCI compliant
When does a company need to be PCI compliantWhen does a company need to be PCI compliant
When does a company need to be PCI compliantDivya Kothari
 
MFX Cybersecurity Services flyer
MFX Cybersecurity Services flyerMFX Cybersecurity Services flyer
MFX Cybersecurity Services flyerMFX Fairfax
 
Online_Transactions_PCI
Online_Transactions_PCIOnline_Transactions_PCI
Online_Transactions_PCIKelly Lam
 

Similar to White Paper: Windstream's Position on Security Compliance (20)

Pci compliance without compensating controls how to take your mainframe out ...
Pci compliance without compensating controls  how to take your mainframe out ...Pci compliance without compensating controls  how to take your mainframe out ...
Pci compliance without compensating controls how to take your mainframe out ...
 
Security Compliance Models- Checklist v. Framework
Security Compliance Models- Checklist v. FrameworkSecurity Compliance Models- Checklist v. Framework
Security Compliance Models- Checklist v. Framework
 
PCI Compliance Report
PCI Compliance ReportPCI Compliance Report
PCI Compliance Report
 
Verizon 2014 pci compliance report
Verizon 2014 pci compliance reportVerizon 2014 pci compliance report
Verizon 2014 pci compliance report
 
Verizon 2014 PCI Compliance Report
Verizon 2014 PCI Compliance ReportVerizon 2014 PCI Compliance Report
Verizon 2014 PCI Compliance Report
 
crucet1crucet2crucet
crucet1crucet2crucetcrucet1crucet2crucet
crucet1crucet2crucet
 
How to Prepare for a PCI DSS Audit
How to Prepare for a PCI DSS AuditHow to Prepare for a PCI DSS Audit
How to Prepare for a PCI DSS Audit
 
Data Sheet For Erg
Data Sheet For ErgData Sheet For Erg
Data Sheet For Erg
 
CHAPTER 3 Security Policies and Regulations In this chap
CHAPTER 3 Security Policies and Regulations In this chapCHAPTER 3 Security Policies and Regulations In this chap
CHAPTER 3 Security Policies and Regulations In this chap
 
Best Practices to Protect Cardholder Data Environment and Achieve PCI Compliance
Best Practices to Protect Cardholder Data Environment and Achieve PCI ComplianceBest Practices to Protect Cardholder Data Environment and Achieve PCI Compliance
Best Practices to Protect Cardholder Data Environment and Achieve PCI Compliance
 
Jelecos: Achieving Compliance with Axcient
Jelecos: Achieving Compliance with AxcientJelecos: Achieving Compliance with Axcient
Jelecos: Achieving Compliance with Axcient
 
Privacy and security insurance coverage relates to pci (payment card industry...
Privacy and security insurance coverage relates to pci (payment card industry...Privacy and security insurance coverage relates to pci (payment card industry...
Privacy and security insurance coverage relates to pci (payment card industry...
 
PCI DSS Reaper - Are you ready - VIMRO
PCI DSS Reaper - Are you ready - VIMROPCI DSS Reaper - Are you ready - VIMRO
PCI DSS Reaper - Are you ready - VIMRO
 
2015 09-22 Is it time for a Security and Compliance Assessment?
2015 09-22 Is it time for a Security and Compliance Assessment?2015 09-22 Is it time for a Security and Compliance Assessment?
2015 09-22 Is it time for a Security and Compliance Assessment?
 
Law firm information security overview focus on encryption by dave cunningh...
Law firm information security overview   focus on encryption by dave cunningh...Law firm information security overview   focus on encryption by dave cunningh...
Law firm information security overview focus on encryption by dave cunningh...
 
MA 201 CMR 17.00 Personal Identity Security
MA 201 CMR 17.00 Personal Identity SecurityMA 201 CMR 17.00 Personal Identity Security
MA 201 CMR 17.00 Personal Identity Security
 
Fdic ffiec cyber_security_assessments
Fdic ffiec cyber_security_assessmentsFdic ffiec cyber_security_assessments
Fdic ffiec cyber_security_assessments
 
When does a company need to be PCI compliant
When does a company need to be PCI compliantWhen does a company need to be PCI compliant
When does a company need to be PCI compliant
 
MFX Cybersecurity Services flyer
MFX Cybersecurity Services flyerMFX Cybersecurity Services flyer
MFX Cybersecurity Services flyer
 
Online_Transactions_PCI
Online_Transactions_PCIOnline_Transactions_PCI
Online_Transactions_PCI
 

More from Windstream Enterprise

Windstream Webinar: Maximizing Your IT Budget
Windstream Webinar: Maximizing Your IT BudgetWindstream Webinar: Maximizing Your IT Budget
Windstream Webinar: Maximizing Your IT BudgetWindstream Enterprise
 
Windstream Webinar: Making Your Business More Productive With MPLS Networking...
Windstream Webinar: Making Your Business More Productive With MPLS Networking...Windstream Webinar: Making Your Business More Productive With MPLS Networking...
Windstream Webinar: Making Your Business More Productive With MPLS Networking...Windstream Enterprise
 
Windstream Webinar: Demystifying VoIP for Business
Windstream Webinar: Demystifying VoIP for BusinessWindstream Webinar: Demystifying VoIP for Business
Windstream Webinar: Demystifying VoIP for BusinessWindstream Enterprise
 
Windstream Webinar: The Latest Trends in Virtualization: Is the cloud right f...
Windstream Webinar: The Latest Trends in Virtualization: Is the cloud right f...Windstream Webinar: The Latest Trends in Virtualization: Is the cloud right f...
Windstream Webinar: The Latest Trends in Virtualization: Is the cloud right f...Windstream Enterprise
 
Windstream Webinar: The Evolution of the Data Center
Windstream Webinar: The Evolution of the Data CenterWindstream Webinar: The Evolution of the Data Center
Windstream Webinar: The Evolution of the Data CenterWindstream Enterprise
 
Windstream Webinar: Debunking Network Security Myths
Windstream Webinar: Debunking Network Security MythsWindstream Webinar: Debunking Network Security Myths
Windstream Webinar: Debunking Network Security MythsWindstream Enterprise
 
Windstream Webinar: “Data Centers: Outsource or Own?” with Forrester Research
Windstream Webinar: “Data Centers: Outsource or Own?” with Forrester ResearchWindstream Webinar: “Data Centers: Outsource or Own?” with Forrester Research
Windstream Webinar: “Data Centers: Outsource or Own?” with Forrester ResearchWindstream Enterprise
 
White Paper: Windstream Leveraging Funding for EHR While Meeting HIPAA Requir...
White Paper: Windstream Leveraging Funding for EHR While Meeting HIPAA Requir...White Paper: Windstream Leveraging Funding for EHR While Meeting HIPAA Requir...
White Paper: Windstream Leveraging Funding for EHR While Meeting HIPAA Requir...Windstream Enterprise
 
White Paper: Leveraging Funding for EHR
White Paper: Leveraging Funding for EHRWhite Paper: Leveraging Funding for EHR
White Paper: Leveraging Funding for EHRWindstream Enterprise
 
White Paper: Is Your Network Safe Behind Just a Firewall?
White Paper: Is Your Network Safe Behind Just a Firewall?White Paper: Is Your Network Safe Behind Just a Firewall?
White Paper: Is Your Network Safe Behind Just a Firewall?Windstream Enterprise
 
White Paper: Analyzing MPLS from an ROI Perspective
White Paper: Analyzing MPLS from an ROI PerspectiveWhite Paper: Analyzing MPLS from an ROI Perspective
White Paper: Analyzing MPLS from an ROI PerspectiveWindstream Enterprise
 
Case Study: Windstream Healthcare Christus St. Michael
Case Study: Windstream Healthcare Christus St. MichaelCase Study: Windstream Healthcare Christus St. Michael
Case Study: Windstream Healthcare Christus St. MichaelWindstream Enterprise
 
Case Study: Windstream Capitol Broadcasting
Case Study: Windstream Capitol BroadcastingCase Study: Windstream Capitol Broadcasting
Case Study: Windstream Capitol BroadcastingWindstream Enterprise
 

More from Windstream Enterprise (15)

Windstream Webinar: Maximizing Your IT Budget
Windstream Webinar: Maximizing Your IT BudgetWindstream Webinar: Maximizing Your IT Budget
Windstream Webinar: Maximizing Your IT Budget
 
Windstream Webinar: Making Your Business More Productive With MPLS Networking...
Windstream Webinar: Making Your Business More Productive With MPLS Networking...Windstream Webinar: Making Your Business More Productive With MPLS Networking...
Windstream Webinar: Making Your Business More Productive With MPLS Networking...
 
Windstream Webinar: Demystifying VoIP for Business
Windstream Webinar: Demystifying VoIP for BusinessWindstream Webinar: Demystifying VoIP for Business
Windstream Webinar: Demystifying VoIP for Business
 
Windstream Webinar: The Latest Trends in Virtualization: Is the cloud right f...
Windstream Webinar: The Latest Trends in Virtualization: Is the cloud right f...Windstream Webinar: The Latest Trends in Virtualization: Is the cloud right f...
Windstream Webinar: The Latest Trends in Virtualization: Is the cloud right f...
 
Maximizing it budget
Maximizing it budgetMaximizing it budget
Maximizing it budget
 
Windstream Webinar: The Evolution of the Data Center
Windstream Webinar: The Evolution of the Data CenterWindstream Webinar: The Evolution of the Data Center
Windstream Webinar: The Evolution of the Data Center
 
Windstream Webinar: Debunking Network Security Myths
Windstream Webinar: Debunking Network Security MythsWindstream Webinar: Debunking Network Security Myths
Windstream Webinar: Debunking Network Security Myths
 
Windstream Webinar: “Data Centers: Outsource or Own?” with Forrester Research
Windstream Webinar: “Data Centers: Outsource or Own?” with Forrester ResearchWindstream Webinar: “Data Centers: Outsource or Own?” with Forrester Research
Windstream Webinar: “Data Centers: Outsource or Own?” with Forrester Research
 
White Paper: Windstream Leveraging Funding for EHR While Meeting HIPAA Requir...
White Paper: Windstream Leveraging Funding for EHR While Meeting HIPAA Requir...White Paper: Windstream Leveraging Funding for EHR While Meeting HIPAA Requir...
White Paper: Windstream Leveraging Funding for EHR While Meeting HIPAA Requir...
 
Product Information: Cloud Services
Product Information: Cloud ServicesProduct Information: Cloud Services
Product Information: Cloud Services
 
White Paper: Leveraging Funding for EHR
White Paper: Leveraging Funding for EHRWhite Paper: Leveraging Funding for EHR
White Paper: Leveraging Funding for EHR
 
White Paper: Is Your Network Safe Behind Just a Firewall?
White Paper: Is Your Network Safe Behind Just a Firewall?White Paper: Is Your Network Safe Behind Just a Firewall?
White Paper: Is Your Network Safe Behind Just a Firewall?
 
White Paper: Analyzing MPLS from an ROI Perspective
White Paper: Analyzing MPLS from an ROI PerspectiveWhite Paper: Analyzing MPLS from an ROI Perspective
White Paper: Analyzing MPLS from an ROI Perspective
 
Case Study: Windstream Healthcare Christus St. Michael
Case Study: Windstream Healthcare Christus St. MichaelCase Study: Windstream Healthcare Christus St. Michael
Case Study: Windstream Healthcare Christus St. Michael
 
Case Study: Windstream Capitol Broadcasting
Case Study: Windstream Capitol BroadcastingCase Study: Windstream Capitol Broadcasting
Case Study: Windstream Capitol Broadcasting
 

Recently uploaded

A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 

Recently uploaded (20)

A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 

White Paper: Windstream's Position on Security Compliance

  • 1. WHITE PAPER Windstream’s Position on Security Compliance Compliance In General Our customers are under increasing Government Mandated Privacy Acts pressure to adhere to numerous security (Massachusetts, California, and compliance standards and design Minnesota, with others to follow) – networks that address the best practices Applies to anyone doing business in associated with these standards. As these states any healthcare provider can tell you, the Health Insurance Portability and content of the standards themselves can Accountability Act (HIPAA) – be daunting to understand and apply, Applies to the healthcare vertical which has driven organizations to look Gramm-Leach-Bliley Act (GLBA) – outside for assistance. Applies to the financial vertical Sarbanes-Oxley Act (SOX) – Top Five Industry Compliance Applies to public companies Standards Payment Card Industry Digital Security Standard (PCI DSS) – Applies to any company processing, transporting, or storing credit card information Overview of Standards PCI DSS – The goal of PCI DSS 1, 2010. It applies generally to those is to create a framework for good businesses that own or license personal security practice around the handling information about Massachusetts of cardholder data. A PCI-compliant residents. Personal information includes operating environment is one in which Massachusetts residents’ first and last the cardholder data exists (i.e., it does names, or first initials and last names, in NOT refer to the whole corporate combination with any of the following: network), and PCI DSS defines the Social Security number, driver’s license requirements for how access to this data number or state-issued identification must be controlled, monitored, logged, card number, financial account and audited. number, or credit or debit card number. Therefore, if you have any employees, Government Mandated Privacy Acts receive payments from individuals (Massachusetts) – The Massachusetts (whether by check or credit card), or Data Privacy Act (201 CMR 17), now send out 1099s, your business owns or recently revised, went into effect March licenses personal information and, thus, © Windstream 2012 DATE: 3.27.12 | REVISION: 2 | 009574_Windstream’s_Position | CREATIVE: MF | JOB#: 9574 - Windstream’s Position on Security Compliance | COLOR: GS | TRIM: 8.5” x 11”
  • 2. WHITE PAPER Overview of Standards must comply with the law. Minnesota applies to information of any consumers (Cont.) and California recently passed similar past or present of the financial laws and it’s expected that this trend institution’s products or services.) will continue for the remaining 47 This plan must include: states in the near future. Denoting at least one employee to manage the safeguards HIPAA – HIPAA covers a number of Constructing thorough risk healthcare standards, one of which management on each department is the HIPAA Security Rule, which handling the non-public information requires implementation of three types Developing, monitoring, and testing a of safeguards: program to secure the information Modifying the safeguards as needed Administrative with the changes in how information is Physical collected, stored, and used Technical This rule is intended to do what most In addition, it imposes other businesses should already be doing: organizational requirements and protecting their clients. The Safeguards a need to document processes Rule forces financial institutions to analogous to the Privacy Rule. take a closer look at how they manage Implementing within and adhering private data and to do a risk analysis to this rule is extremely difficult due on their current processes. No process to the highly technical nature of the is perfect, so this has meant that every contents of the rule. financial institution has had to make some effort to comply with the GLBA. GLBA – The Safeguards Rule, a part of the GLB Act, requires SOX – The impact of IT security within financial institutions to develop a SOX is somewhat indirect since the law written information security plan is primarily focused on the accuracy of that describes how the company is financial reporting data. IT security is prepared for, and plans to continue to important under SOX only to the extent protect clients’ non-public personal that it enhances the reliability and information. (The Safeguards Rule integrity of that reporting. © Windstream 2012
  • 3. WHITE PAPER Windstream’s Strategy Around The Internet Service Provider (ISP) 10. Continuous Vulnerability Assessment Compliance has an interesting role in compliance. and Remediation Since the essential underlying focus of 11. Account Monitoring and Control popular compliance standards today 12. Malware Defenses is on individual enterprise context, it’s 13. Limitation and Control of Network impossible for Windstream to provide Ports, Protocols, and Services “instant on” compliance. However, with 14. Wireless Device Control our Security Consultation services, as 15. Data Loss Prevention well as the best practices that we’ve 16. Secure Network Engineering implemented internally and consult 17. Penetration Tests and Red Team our customers to follow, Windstream Exercises has made it as easy as possible for 18. Incident Response Capability customers from all verticals to meet and 19. Data Recovery Capability exceed the standards laid out for them 20. Security Skills Assessment and by the various regulatory bodies. Each Appropriate Training to Fill Gaps compliance standard is built around a foundation of concepts best outlined Furthermore, Windstream is actively by the SANS Institute and mirrored by taking advantage of the SAS 70 auditing Windstream’s business best practices. process to provide customers with the They include: necessary information to inform their auditors and planners of compliance- 1. Inventory of Authorized and friendly topologies and practices. A Unauthorized Devices SAS 70 is performed by a third party 2. Inventory of Authorized and that reviews our security controls, then Unauthorized Software verifies that we’re adhering to them by 3. Secure Configurations for Hardware reviewing, auditing, and scoring our and Software on Laptops, performance. Since our customers are Workstations, and Servers under a myriad of compliance standards, 4. Secure Configurations for Network we developed our controls based upon Devices such as Firewalls, Routers, the best practices mentioned above and Switches and mapped our practices to PCI 5. Boundary Defense DSS and other compliance standards. 6. Maintenance, Monitoring, and This way, we can present our SAE Analysis of Audit Logs 16 documentation to any customer 7. Application Software Security who needs to prove that Windstream 8. Controlled Use of Administrative practices security standards which Privileges exceed the compliance standards to 9. Controlled Access Based on Need which they’re being held. This approach to Know makes the most sense for both Windstream and our customers. © Windstream 2012
  • 4. WHITE PAPER Things We’re Watching & Since Windstream’s role is central to there are a number of best practices What We’re Doing customer network security, we as an ISP and technologies that we’re focusing and Managed Security Service Provider on to control access, then monitor and (MSSP) must be “ahead of the curve” to equip zones within the organization with maintain our position within the confines legitimate access to these services to of the popular compliance standards properly handle threats. because the overwhelming buying triggers for our services surround these Enclaving – There is no ‘silver bullet’ in standards. We see emerging threats and security. If there were, this multi-billion general business practices that require dollar industry would not exist. Given review and standards application on a that reality, it’s becoming increasingly regular basis. more prudent to design networks (LAN and WAN) that are zoned (or Top Three Emerging Trends enclaved) in such a way that in the event of a successful attack or breach, Best practices surrounding safe and the impact to the organization as a secure utilization of social media whole is minimized. As threats grow in Best practices incorporating enclaving complexity, best practices around this of network elements to reduce the concept are increasing in value. impact of a breach or incident Best practices surrounding the Mobile Devices – Innovation and deployment, control, and risk incorporation of mobile devices is mitigation associated with mobile skyrocketing across all industries. Mobile technology (Android, iPad, iPhone, device security, as a result, is becoming WiFi, etc.) a targeted focus for our customers and our organization. The development of Social Media – Malware and bot-net best practices and the deployment threats are synonymous with social of security technology with a focus media. While it’s a well known best on mobile device risk reduction and practice to develop Web acceptable mitigation is a top priority at Windstream. use policies that block access to these services, an increasing number of organizations use social media as an advertising and information distribution outlet. With this trend, 009574 | 3/12 © Windstream 2012