51
Quels types de logs sont souhaités : logs système, logs sécurité, les deux ?
We are mostly looking at application (user/admin) logs, possibly a couple of cloud related security logs [...]
17/06/2020
Répondu
52
Le protocole SFTP est-il obligatoire ? Une solution "Sync & Share" est-elle envisageable ? Une solution [...]
The goal is to allow cloud to cloud file exchanges in a context where not all applications have APIs. [...]
17/06/2020
Répondu
53
EIF a-t-elle besoin d'accéder à l'outil mis en place ?
EIF does not plan to do any operation or scan with it but a read-ony access might be of interest
17/06/2020
Répondu
54
In chapter "4.1..9..2 Functional requirements", we find the following sentence "the creation of dedicated [...]
Solution here refers to any EIF Cloud application for which we expect to support work orders, incident [...]
17/06/2020
Répondu
55
Is there an existing Service Catalog ? If yes, can you provide details ?
There is no service catalogue to date. This should be built during the implementation project.
17/06/2020
Répondu
56
Is it possible to have the average number of incidents and work order tickets you are managing per month [...]
A rough estimation would be 500 work orders and 600 "application helpdesk" requests across all Cloud [...]
17/06/2020
Répondu
57
Is Data anonymization done on server side or does EIF expect Data to be anonymized on Provider's side [...]
Since we are talking about security logs mostly, it remains important to be able to link an event with [...]
17/06/2020
Répondu
58
Is it possible to install an agent on the servers in order to retrieve logs or do we have to use syslog [...]
By default, we should consider a syslog approach or even possibly the need to fetch logs even more manually [...]
17/06/2020
Répondu
59
Does the offer of the bidder needs to include the cost of the required technologies (licences or subscriptions [...]
The offer shall include the cost of the required technologies. Setting up properly secured services is [...]
17/06/2020
Répondu
60
1.- Could you please provide an architecture of the systems to be protected with encryption key management [...]
There is not so much an architecture in place today, it is ad hoc encryption on a per Cloud application [...]
17/06/2020
Répondu