Defense-in-Depth Security
CSC's holistic defense-in-depth security framework provides the physical, logical, access control and data integrity options needed to support mission critical, customer-facing and back-office applications.
Access Control
- Authentication, authorization, and access
- Anti-spoofing
- CSC Audit Log Assurance*
- Key shields encryption*
- Secure VLANs
- Virtual and network perimeter firewalls
Data Integrity*
- Scheduled and ad hoc security scanning
- Security incident response 24x7
- Annual SAS 70 Type II review
- Antivirus services
- Qualys vulnerability scanning for compliance
Logical Security
- Client data isolated
- Client separation via firewalls
- Hypervisor isolation for network adapters
- ITIL standards
- Network intrusion detection
Physical Security
- Access-controlled Tier III data centers
- Servers in secure suites or cages
- Video surveillance monitored 24x7
- Personal background checks
- Multi-factor authentication
- Separation of staff duties
* Optional Service
