SECURITY DESIGN Sample Clauses
The Security Design clause outlines the requirements and standards for the design and implementation of security measures within a project or system. It typically specifies the types of security controls that must be incorporated, such as encryption, access controls, and monitoring, and may require compliance with industry standards or regulatory frameworks. By clearly defining these expectations, the clause ensures that security considerations are integrated from the outset, reducing the risk of vulnerabilities and helping to protect sensitive data and assets throughout the lifecycle of the project.
SECURITY DESIGN. 1. Controlled access is required to the entire building and to each individual floor. If required by the Request for Proposal (RFP), Program, or State Agency Supplementary Standards, provide conduit and power for a card access management system matching the existing State of Michigan access system which is currently manufactured by Honeywell Security Products. The access system is to be capable of tracking the issuing and revocation of access cards along with generating reports of all access into the building. Provide these readers and locking/operation devices at all building entrances, loading docks, and interior doors as defined in the detailed program.
2. Central data base computer is to connect all access locations, equipped for stand‐alone operation upon power failure, programmed for automatic locking/unlocking of building doors.
3. If required by the Request for Proposal (RFP), Program, or State Agency Supplementary Standards, provide conduit and power for security cameras covering all access points.
4. Transaction windows shall have pre‐manufactured transaction window(s) with speaker port(s), pass through opening and counter. Glass shall be bullet resistant. Walls adjacent and below transaction windows shall have bullet resistant construction.
SECURITY DESIGN a. Layout communication and power pathways and routing plan for security devices provide pathway types and sizes, cable quantities and characteristics.
b. CCTV camera scope will consist of removal and re-installation of cameras in the same location where they currently are.
c. Detail security riser diagrams, security rack layouts, and wall elevations. Provide detailed schedules for CCTV and ACS doors outlining all essential installation and configuration parameters.
d. Provide outline division 28 specifications.
SECURITY DESIGN a. Conduct a working session with TPA to identify areas of CCTV coverage and access controlled doors.
b. Provide CCTV device distribution plan based on asset identification and the Threat, Risk and Vulnerability Assessment.
c. Basis of design for access control and CCTV systems will be based on the expansion of the existing systems.
d. Identify points of vulnerability where electronic access control should be provided. Identify points of integration for camera call ups with CCTV system.
SECURITY DESIGN. This design outlines how security is implemented both physically and logically within the facilities. Performance. Design considerations that may impact performance, to include availability, response time, throughput, transaction volumes, problem complexity, and peak load. Additional Considerations. A description of any other characteristics of the design. CONTRACTOR shall develop and document all necessary workflows, processes and procedures to accomplish Print Services during implementation. The workflows, processes and procedures shall be comprehensively documented in a standard format in the Print Services Maintenance and Operations Plan. Design and Development activities will continue until the new Print Services are operational for all designated Counties.
SECURITY DESIGN. The Supplier shall supply a Security Management Plan supplied as part of the bid that shall: Be scoped within the ISO/IEC 27001 certification (and any equivalent replacement certification) recognised by the British Standards Institution; Identify the necessary delegated organisational roles defined for those responsible for ensuring Schedule 2.4 is complied with by the Supplier; Detail the process for managing any security risks from Sub-contractors and third parties authorised by the Authority with access to the Services, processes associated with the delivery of the Services, the Authority Premises, the Sites/Serviced Sites, the Supplier IT/WMS Solution, the Authority Supplier Information and data (including the Authority Confidential Information and the Authority Data) and any Supplier IT/WMS Solution that could directly or indirectly have an impact on that Information, data and/or the Services; Set out the security measures to be implemented and maintained by the Supplier in relation to all aspects of the Services and all processes associated with the delivery of the Services; Demonstrate that the Supplier Solution has minimised the Authority and Supplier effort required to comply with Schedule 2.4 through consideration of available, 'platform as a service' offerings from the G-Cloud catalogue); and Be structured in accordance with ISO/IEC 27001 and ISO/IEC 27002. The Supplier shall comply with the UK Government Security Classifications Policy in order to recognise government classification and handling markings and ensure the appropriate level of information security and information management required by the same. The Supplier shall ensure that any technology developed or utilised for fulfilment of this Agreement, will be developed, reviewed and where proportional remediated, in line with Good Industry Practice including professional certified independent technical security testing (such as NCSC CHECK, TigerSCHEME or CREST) or as approved by the Authority against application source code and associated underlying infrastructure and where possible utilise and/or align to the Open Standards for Government. Professional certified independent technical security testing shall include, but not be limited to – Open Web Application Security Project (OWASP) 'Top 10'. The Supplier may not utilise Authority Materials or Authority Systems for purposes other than those permitted by this Agreement and shall take all measures to ensure the same. The Supplier IT/WMS ...
SECURITY DESIGN. CTI Consulting, as a subconsultant to ▇▇▇▇▇▇, will be responsible for providing security design for the existing security system for the terminal. Design will include: • Static and PTZ cameras • BIO readers • Access control • Storage capacity • Cloud-based storage • System software • Communication Infrastructure
SECURITY DESIGN. The Company agrees to confer with the Client regarding the implementation of hardware and software firewalls and other security concerns. No provisions for the security of the Client Web Server outside of this agreement are expressed or implied.
SECURITY DESIGN. All Comtech supplied services and products used on the BFT network shall meet the requirements set forth in FIPS 140-2 for level 2 compliance, Army Regulation 25-2, ▇▇▇▇ 8500.1 and ▇▇▇▇ 8500.2, and the BFT System Security Authorization Agreement System Requirements Traceability Matrix. If these requirements cannot be met, a waiver must be secured from the Army. Any variance from the requirements in this paragraph must be approved in writing by the Government prior to use on the BFT network. As software and hardware products and security functionality are updated, the Contractor shall adapt the design of the FBCB2 BFT functions to meet security requirements. The FBCB2 BFT system will operate as a Mission Assurance Category (MAC) Level I, as described in ▇▇▇▇ 8500.1, and will meet the IA requirements for the protection of information at this level. Contractor personnel performing IT Position Category duties as defined in AR 25-2 and applicable to unclassified DoD information systems, must meet the investigative and assignment requirements IAW AR 25-2 and AR 380-67. An IT Position Category Designator indicates the level of IT access required to execute the responsibilities of the position based on the potential for an individual assigned to the position to adversely impact DoD missions or functions. Position categories include: IT-I (Privileged), IT-II (Limited Privileged) and IT-III (Non-Privileged). Investigative requirements for each category are defined in Paragraph 4-14a, AR 25-2 (Reference 2). IT Postion Management is the responsibility of the contractor. The contractor maintains administrative accounting and control of all CMS FBCB2 BFT authorized IT Positions. A by-name listing of personnel assigned to IT Level positions will be used to maintain accountability of assignment to IT-sensitive positions. Upon assignment to a position, the appropriate investigation will be initiated. An individual will not be allowed to work in an IT-sensitive until the investigative requirements are met. If the appropriate investigative requirements cannot be favorably adjudicated, the individual will not be assigned to the IT-sensitive position. The government’s authorized representatives will request review of these positions to ensure compliance. Classified information / material will be protected IAW the Department of Defense, 5220.22-M, National Industrial Security Program - Operating Manual (NISPOM). Security Requirements will be specified in the Contract Security C...
SECURITY DESIGN. 1. Controlled access is required to the entire building and to each individual floor. If required by the Project Component Checklist, provide conduit and power for a card access management system matching the existing State of Michigan access system. The access system is to be capable of tracking the issuing and revocation of access cards along with generating reports of all access into the building. Provide these readers and locking/operation devices at all building entrances, loading docks, and interior doors as defined in the detailed program.
2. Central data base computer is to connect all access locations, equipped for stand-alone operation upon power failure, programmed for automatic locking/unlocking of building doors.
3. If required by the Project Component Checklist, provide conduit and power for security cameras covering all access points.
4. Transaction windows shall have pre-manufactured transaction window(s) with a speaker ports, pass through opening and counter. Glass shall be bullet resistant. Walls adjacent and below transaction windows shall have bullet resistant construction.
SECURITY DESIGN. Sprint will work with Customer to create a Security Engineering Design Document ("SEDD") for each security device within the network, describing the configuration and accompanying service levels that meet Customer's established security policy. This design is developed to minimize Customer's risks associated with threats and vulnerabilities. Sprint reserves the right to modify the SEDD in response to additional information on Customer's needs.