cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
1842
Views
0
Helpful
0
Comments
ptops
Level 4
Level 4

Extensive measures are implemented for Security and Data protection in DCP, both technical and other.

The below list summarizes the measures taken. Feel free to share this article with customers upon request. Alternatively you can download this pdf version.

 


Access Management

 

Category Implementation

Authentication

cisco.com User ID/password

OAM Protected (Oracle Access Manager), LDAP based authentication and OBSSOCookie based authorization

Authorization Based on the Role played in the project by the individual.
Access Management

Single Sign-On (SSO)

Role Based Access Control (RBAC) (Internal/External) (Internal -- All Cisco/AS-TS/Project team only)

Usage and Metrics maintained in DB

Content Actions tracked with CDP Logs for details activity logging

Privileged Access Management

The access is specific to the client. One customer's data will not be exposed to another customer contact.

Data can be protected within Cisco. Specific project data cannot be viewed by other engineers.

 


Classification

 

Category Implementation

Document Classification Cisco Highly Confidential
Data Loss Prevention

If a non-member of the project downloads the file, the Project Mgr gets notified. Download audit trails.

Capability to archive documents in the database.

Documents get hard deleted per ERIM schedule and corporate legal requirements.

 


Certifications

 

Category Implementation

Certifications ISO 9001 policy/process support,  ISO 27001
Audit Requirements

Internal Audits, Policy external audits for ISO9001, External audit for ISO27001

Vulnerability and Patch Management All the P1 applications (such as DCP) that Cisco IT maintains, undergo BAVA and DAVA analysis every year. (Applications undergoing enhancements like DCP have at least twice a year such analysis)

 


Security

 

Category Implementation

Encryption – at Rest AES 256-bit
Encryption – Transmission HTTPS encryption
Boundary Defense Use of ASA and Firepower 9K at the DC gateways, vASA within the DC, vASA and vLAN policies to maintain separation of environments within the DC
Malware Defense DCP is ACI enabled, where the ACI policies enable full white listing protection from potentially malicious interaction with other applications even within DC
Physical Security Dedicated DC Building, Perimeter Fence, Onsite Security, Strategic Landscaping, Card Reader Controls, Biometric Verification
Platform/ Application Hardening Cisco's LAE is used as platform and it has ACI enablement. Segregation is used between various layers. The metadata for this application is saved in a different database than the actual files, resulting in proper in-depth defense.

 


Miscellaneous

 

Category Implementation

Geo Location Richardson, Texas, US
Incident Response 24/7 monitoring per P1 application specifications. Stakeholders/users are notified during incidents.
Supplier Personnel Management Cisco has extended background checks on the contracted Partner resources

 


toc.png  FAQ

toc.png  Table of Content

Getting Started

Find answers to your questions by entering keywords or phrases in the Search bar above. New here? Use these resources to familiarize yourself with the community: