Download as pdf or txt
Download as pdf or txt
You are on page 1of 15

AGRICULTURE INSURANCE COMPANY OF INDIA LIMITED

Regd. Office: Plate B&C, 5th Floor, Block 1, East Kidwai Nagar, New Delhi-110023

Selection Process for Bidder


1. CSP SERVICES REQUIREMENT

General compliance requirements


• All CSP services should be native to CSP’s cloud environment.
• The CSP should submit the compliance statement conforming the below requirements on their
letter head. Any incorrect/false/misleading submission by CSP shall lead to automatic
disqualification of the bid and may result in blacklisting of the CSP.
• All services provisioned by the CSP under this agreement, including both DC and DR side
services, shall be provided from different data centre locations as empaneled under MeitY.
• The CSP shall have the configurations available, including processors, managed services along
with the features, compute, RAM, etc., for both DC and DR locations for the services/
infrastructure required under this RFP.
• The CSP shall certify the bill of materials, provided in Annexure 2 and the corresponding rates
as required under this RFP.

2.1.1. SERVICE NAME: COMPUTE SERVICES

# Description
1 Virtual Machines The CSP should provide both on-demand (i.e. pay-per-hour) and
(VMs) / Compute long term committed virtual machines / instances for minimum of
Instances 1 year respectively.
2 Virtual Machines Virtual Machine/Compute services should offer 99.9% uptime SLA
(VMs) / Compute with high availability.
Instances
3 Virtual Machines Virtual Machine/Compute services should allow to use the CPU to
(VMs) / Compute the fullest irrespective to the number of threads per CPU.
Instances
3 Resize VMs / The CSP should allow modification of virtual machine / instance
Instances configuration (like CPU, memory, storage) parameters seamlessly.
CSP should provide the capability to scale storage automatically
without any manual intervention and downtime. This should help
AIC to pay only for the used capacity rather than unused
allocated storage to VM.

4 Self-Service The CSP should offer self-service provisioning of virtual machines


Provisioning and other services as a native service either through a
programmatic interface (API/CLI) or through a management
console.
5 Serverless computing The CSP should support serverless computing services that are
Classification: Public
1|P a g e
AGRICULTURE INSURANCE COMPANY OF INDIA LIMITED
Regd. Office: Plate B&C, 5th Floor, Block 1, East Kidwai Nagar, New Delhi-110023

able to run code in response to events and automatically manage


the compute resources.
6 Scaling automation The CSP should support automatic launching or termination of VMs/
instances based on the parameters such as CPU utilization defined by
users. The CSP should support auto scaling using custom metrics as
well.
7 Virtual Machine The CSP should offer pre-configured, template images to get new VMs
Image / instances launched or create an image containing customer
applications, libraries, data, and associated configuration settings.
8 Virtual Machines The CSP must offer operating systems (Linux, RHEL, Windows) for the
(VMs) / Compute VMs for both reserved and on demand VMs.
Instances OS

2.1.2. SERVICE NAME: DATABASE SERVICES

# Description
1. Relational Database The CSP should provide/support of relational database service (like but
Service not limited to Oracle DB, MySQL, SQL, Windows SQL as applicable)
provided as a native cloud service (and not marketplace) enabling
handling of routine database tasks such as provisioning, patching,
backup, recovery, failure detection, and repair etc.
2. High Availability The CSP offered managed database service should support High
Availability of databases.
3. Vertical Scaling The CSP offered managed database service should support vertical
scaling of the database instance with few clicks.
4. Vertical Scaling The CSP offered managed database service should vertically scale
Downtime stand by node first and then primary node. The CSP offered managed
database service should failover to the scaled up stand by node to
reduce downtime.
5. Database Storage The CSP should offer SSD based storage for managed database service.

6. Database Storage The CSP should support minimum 6000 IOPS per volume for database
IOPS storage upto 1 TB and 10000 IOPS per volume for database storage
above 1 TB.
7. Database Storage The CSP should support provisioning of additional IOPS for database
IOPS increase storage without forcing to increase the disk size of the provisioned
storage.
Classification: Public
2|P a g e
AGRICULTURE INSURANCE COMPANY OF INDIA LIMITED
Regd. Office: Plate B&C, 5th Floor, Block 1, East Kidwai Nagar, New Delhi-110023

8. Database Storage The CSP offered managed database service should support storage
scaling auto scaling without rebooting database instance.
9. Database backup The CSP offered managed database service should support backup
from the non-primary database instance to avoid IOPS suspension.
10.Database backup The CSP offered managed database service should support both
manual and automatic backups.
11.Database backup The CSP offered managed database service should support
incremental backups.
12.Database horizontal The CSP offered managed database service should support read
scaling replicas to horizontally scale reader nodes.

2.1.3. SERVICE NAME: STORAGE SERVICES

Block Storage
# Description
1. Support for storage The CSP should offer block level storage volumes for use with
allocated as local VMs / compute instances.
disk to a single VM
2. Storage Volumes The CSP should offer block storage volumes size ranging
from at least 100 GB to 32 TB. CSP should allow to increase
the capacity of single managed disk in 1GB incremental size
for both application and database block storage.

The CSP should charge only for the provisioned block


storage capacity.
3. Auto scaling of block CSP should allow auto scale of storage capacity based on
storage usage without reboot of VM for any size of block storage
volume.
4. The CSP offered block storage disks should allow to increase
the size without either deallocating the VM or detaching the
disk.
5. Block Storage The CSP should support creating the block storage volume
configuration of any size rather than pre-defined configuration.
6. SSD backed VM The CSP should offer solid state drive (SSD) backed VM /
Storage instance storage.
7. I/O support The CSP should offer minimum of 10 IOPS per GB of block
storage.

Classification: Public
3|P a g e
AGRICULTURE INSURANCE COMPANY OF INDIA LIMITED
Regd. Office: Plate B&C, 5th Floor, Block 1, East Kidwai Nagar, New Delhi-110023

8. SSD Backed OS Disk The CSP offered SSD disk should support OS disk usage.
9. Encryption at host The offered SSD block storage should support encryption at
host for added data security.
10. Data Backup The VMs with CSP offered SSD block storage disks should
support backup by using CSP’s native backup service.
11. Encryption using The CSP should offer encryption of data on volumes, disk I/O,
provider managed and snapshots using industry standard AES-256
keys cryptographic algorithm.
Object Storage

1. Scalable object The CSP should offer secure, durable, highly-scalable


storage service object storage for storing and retrieving large amount of
data. The data should automatically be stored in at least
2 different data centers to ensure high durability.
2. Support for Server- The CSP should offer encryption for data at rest using 256-
side Encryption bit Advanced Encryption Standard (AES-256) encryption to
encrypt your data
3. Support for Server The CSP should offer encryption using customer-provided
Side Encryption with keys. These keys should be used to manage both the
Customer- encryption, as data is written to disks, and decryption, when
Provided Keys data is accessed.
4. Object lifecycle The CSP should offer native capability to manage an
Management object’s lifecycle by using a lifecycle configuration, which
defines how objects are managed during their lifetime,
from creation/initial storage to archival to deletion
5. Audit logs The CSP should support audit logs on storage buckets including
details about a single access request, such as the requester,
bucket name, request time, request action, response status, and
error Code.
6. Multi-factor / soft The CSP should support multi-factor / soft deletion capability as
delete an additional security option for storage buckets.
7. Parallel / Multi The CSP should support uploading a single object as a set of
part upload parts where each part is a contiguous portion of the object's
data and these object parts can be uploaded independently
and in any order.
8. Strong The CSP should support read-after-write consistency for
Consistency PUT operations for new objects.
9. Automatic The CSP should offer object storage with the capability to
storage tiering monitor access patterns and automatically move objects
that have either been accessed infrequently or never
Classification: Public
4|P a g e
AGRICULTURE INSURANCE COMPANY OF INDIA LIMITED
Regd. Office: Plate B&C, 5th Floor, Block 1, East Kidwai Nagar, New Delhi-110023

accessed to lower-cost access tiers.

Archival Storage
1. Archival The CSP should offer low cost archival storage to store
Storage long-lived data.
2. Archival The CSP should offer ability to retrieve archived data in
Storage milliseconds.
retrieval
3. Archival The CSP offered archival storage should support
Storage minimum object duration of 180 days or less.
minimum
duration

File Systems
1. SSD based file The CSP should offer fully managed SSD backed file
system system.
2. Data durability The Storage in the CSP offered File System to
and automatically be backed across data centers that are in
redundancy. different physical location (distinct and independent
infrastructure) to avoid common points of failure across
Data centre (Zone Redundant).
3. File System The CSP offered File System should be accessible by using
supported NFS, SMB, and iSCSI protocols.
protocols
4. Container The CSP offered File System should be accessible from
support containers as well.
5. Client The CSP offered managed File System should support
connections thousands of simultaneous clients.
6. File System The CSP offered managed File System should support
cloning Point-in-time, instantaneous cloning of the volume.
7. Performance The CSP offered managed File System should provide
consistent sub-millisecond latencies.
8. Compression The CSP managed File System should support
and compression and deduplication.
Deduplication
9. File and folder The CSP managed File System should support restoring
retrieval individual files and folders to previous versions.
10. Data The CSP managed File System should support data

Classification: Public
5|P a g e
AGRICULTURE INSURANCE COMPANY OF INDIA LIMITED
Regd. Office: Plate B&C, 5th Floor, Block 1, East Kidwai Nagar, New Delhi-110023

Encryption encryption and rest and in-transit.


11. Compliances The CSP managed File System should be compliant to ISO
9001, ISO 27001, ISO 27017, ISO 27018, SOC 1, SOC 2 and
SOC 3.
12. Anti-virus scan The CSP managed File System should support Anti-Virus
support integration to scan the files as soon as they are written
on the File System.

2.1.4. SERVICE NAME: NETWORK SERVICES

# Description
1 IP Protocol The CSP should support multiple IP protocols, including TCP,
support UDP, and ICMP protocols.
2 Subnet levelThe CSP should support subnet level filtering – Network ACLs
filtering (Network / Security Groups that act as a firewall for associated subnets,
ACLs/ Security controlling both inbound and outbound traffic at the subnet
Groups) level.
3 Ingress filtering The CSP should support adding or removing rules applicable
to inbound traffic (ingress) to instances.
4 Egress filtering The CSP should support adding or removing rules applicable
to outbound traffic (egress) originating from instances.
5 Site-to-Site IPSec The CSP should support Site-to-Site IPSec VPN connection
VPN service between the cloud provider and customer data centre.
6 Load Balancing of The CSP should support Load balancing of instances across
VM multiple host servers. Load balancer should be capable of load
balance HTTP / HTTPS applications. Load balancer should be
capable of SSL decryption (offloading). Load Balancers should
also support Internet Protocol version 6 (IPv6).
7 Domain Name The CSP should provide a scalable and highly available DNS
Registration (DNS) service.
Service
8 Content Delivery The CSP should offer content delivery network service to speed
Network (CDN) up distribution of static and dynamic web content. CSPs should
have content delivery network edge locations in India.

Classification: Public
6|P a g e
AGRICULTURE INSURANCE COMPANY OF INDIA LIMITED
Regd. Office: Plate B&C, 5th Floor, Block 1, East Kidwai Nagar, New Delhi-110023

2.1.5. SERVICE NAME: SECURITY SERVICES

# Description
The CSP should have a native service for a comprehensive view of the
high-priority security alerts and compliance status across multiple
accounts.
Native service to provide a single place that aggregates, organizes, and
prioritizes the security alerts, or findings, from multiple services and
Security
1 sources.
Monitoring
The findings should be visually summarized on integrated dashboards
with actionable graphs and tables.
CSP should have native capability to continuously monitor the
environment using automated compliance checks based on the best
practices and industry standards.
The CSP should have native capabilities to securely control access to
services and resources for the users.
Identity and
CSP should have native abilities to create and manage users.
2 Access
CSP should have native capabilities to create roles and groups.
Management
Native support to enforce permissions-based access to the resources.
Native support to manage federated users and their permissions.
The CSP should offer a native fully managed threat detection service.
Native capabilities to continuously monitor for malicious or
unauthorized behavior.
Native capabilities to analyze billions of events across multiple accounts
Threat
3 using machine learning to detect anomalies.
Detection
The native threat detection service should be able to generate
actionable alerts.
The native threat detection service should support integration with
existing event management and workflow systems.
The CSP should offer a native service for automated security assessment.
Native service to help improve the security and compliance of
applications deployed on the cloud.
Native service to automatically assess applications for exposure,
Security vulnerabilities and deviations from best practices.
4 Assessment Service should be able to produce a detailed list of security findings
Services prioritized by level of severity.
Should be able to check for unintended network accessibility and
vulnerabilities of the VMs.
Should offer pre-defined rules packages mapped to common security
best practices and vulnerability definitions.
Classification: Public
7|P a g e
AGRICULTURE INSURANCE COMPANY OF INDIA LIMITED
Regd. Office: Plate B&C, 5th Floor, Block 1, East Kidwai Nagar, New Delhi-110023

# Description
Rules should be regularly update by the CSP.
The CSP should have a native, fully managed data security and data
privacy service.
The native data security service should be able to automatically discover,
classify, and protect sensitive data in cloud.
Native support to recognizes sensitive data such as personally
Data identifiable information (PII) or intellectual property using machine
5 Protection learning.
Service Should provide dashboards and alerts to give visibility into how this data
is being accessed or moved.
Should be able to continuously monitor data access activity for
anomalies detection.
Should be able to generates detailed alerts when risk of unauthorized
access or inadvertent data leaks are detected
The CSP should have a native service to provision, manage, and deploy
Secure Sockets Layer/Transport Layer Security (SSL/TLS) certificates.
6 SSL Certificate The native service should support both public and private certificates.
The native service should have capabilities to take care of certificate
renewals.
The CSP should offer a native, fully managed, cloud-based hardware
security module to easily generate and use our own encryption keys on
the Cloud.
The native hardware security module should be FIPS 140-2 Level 3
compliant.
The native hardware security module should support our own
encryption keys.
7 Cloud HSM The native hardware security module should support deployment in
cluster mode for high availability.
The native security module should have ability to provide high
availability and load balancing.
Should be able to provide availability of HSM within 1 hour, in case of
any failure of HSM unit.
The native hardware security module should have support to integrate
with the applications using industry-standard APIs.
The CSP should offer a native security service to centrally configure and
manage firewall rules.
Firewall The native security service should be able to configure firewall rules
8
Management across multiple accounts and applications.
The native security service should provide a mechanism to easily roll out
firewall rules.

Classification: Public
8|P a g e
AGRICULTURE INSURANCE COMPANY OF INDIA LIMITED
Regd. Office: Plate B&C, 5th Floor, Block 1, East Kidwai Nagar, New Delhi-110023

# Description
The native security service should be able to support new applications
and resources into compliance with a common set of security rules from
day one.
The native security service should provide a single place to build firewall
rules, create security policies, and enforce them in a consistent,
hierarchical manner.
The CSP should offer a native, fully managed service to create and
manage encryption keys.
The native, fully managed key management service should be able to
control encryption across a wide range of cloud services and
Encryption
applications.
9 Key
The native, fully managed key management service should be FIPS 140-2
Management
complaint.
The native fully managed key management service should be able to
provide the logs of all key usage to help meet our regulatory and
compliance.
The CSP should have a native, fully managed service to centrally manage
secrets needed to access the applications, services, and IT resources.
The native, fully managed secret management service should be able to
easily rotate, manage and retrieve database credentials, API keys, and
other secrets throughout their lifecycle.
Password The native, fully managed secret management service should be able to
10
Management support API based retrieval of secrets.
The native, fully managed secret management service should be able to
control access to secrets using fine-grained permissions.
The native, fully managed secret management service should be able to
audit secret rotation centrally for resources in the cloud, third-party
services and on-premises.
The CSP should have a native managed service to protect against
Distributed Denial of Service (DDoS) attacks.
DDoS
11 The native managed DDoS protection service should provide always-on
Protection
detection and automatic inline mitigations that minimize application
downtime and latency.
The CSP should have native support for Single Sign-On (SSO).
The native SSO service should be able to centrally manage SSO access to
multiple accounts and business applications.
12 Single Sign-On
The native SSO service should be highly available.
The native SSO service should support built-in SAML integrations to
many business applications.

Classification: Public
9|P a g e
AGRICULTURE INSURANCE COMPANY OF INDIA LIMITED
Regd. Office: Plate B&C, 5th Floor, Block 1, East Kidwai Nagar, New Delhi-110023

# Description
The native SSO service should be able to extend SSO access to any of the
SAML-enabled applications.
The native SSO service should be able to use existing corporate
credentials to access all the assigned accounts and applications from one
place.
The CSP should have a native web application firewall.
The native web application firewall should be able to protect the web
applications from common web exploits that could affect application
availability, compromise security, or consume excessive resources.
The native web application firewall should be able to give us control
over which traffic to allow or block the web application by defining
customizable web security rules.
Web
The native web application firewall should support creation of new
13 Application
custom rules that block common attack patterns, such as SQL injection
Firewall
or cross-site scripting and rules that are designed for our specific
application.
The native web application firewall should be able to deploy new rules
immediately.
The native web application firewall should support API based operations
to automate the creation, deployment, and maintenance of web security
rules.
Multi-factor The CSP should offer rule based multi-factor authentication for the cloud
14
authentication portal.

2.1.6. SERVICE NAME: VISUALIZATION/ ANALYTICS/ AI/ML SERVICES

# Description
CSP should offer a native serverless BI visualization service with on per user and per
1
view basis.
BI visualization service should provide both in-memory data storage and connection
2
to different data sources for dashboard queries.
BI visualization service should provide drag and drop feature, data filtering and
3
feature engineering capabilities to create visualization.
BI visualization service should provide machine learning based automatic trend
4
identification in data

BI visualization service should provide linking of charts, multiple pages/tabs in a


5
dashboard to group different types of charts in a dashboard

BI visualization service should provide feature of automatically generating narratives


6
based on data.
Classification: Public
10 | P a g e
AGRICULTURE INSURANCE COMPANY OF INDIA LIMITED
Regd. Office: Plate B&C, 5th Floor, Block 1, East Kidwai Nagar, New Delhi-110023

# Description
BI visualization service should support asking questions in natural language and
7
receive answers with relevant visualizations
BI visualization service should automatically scale based on number of users and
8
dashboard access.

9 BI visualization server should allow both row level and column level security

Serverless BI visualization service should support embedding of dashboard in


10
webpage to personalize color and font etc.

11 Serverless BI visualization service should allow sending custom branded email reports

Serverless BI visualization service should allow utilizing machine learning capabilities


12
e.g. anomaly detection, forecasting
Serverless BI visualization service should allow integration with machine learning
13
service to leverage custom machine learning models
CSP should have native managed data warehouse service to work on petabyte scale
14
of data.
Managed data warehouse service should have native feature to integrate with Data
15
Lake and run queries directly on data lake storage
Managed data warehouse service should be able to query data in warehouse and
16 data lake together. Data warehouse should allow joins between data warehouse data
and data lake data

17 Managed data warehouse should allow querying the operational database directly

18 Managed data warehouse should allow compute and storage to scale independently

19 Managed data warehouse should allow use of machine learning in queries

20 Managed data warehouse should support native processing of spatial data

Managed data warehouse should support end to end encryption of data (at rest and
21
in transit between cluster nodes)

22 Managed data warehouse should provide granular column level security controls

Managed data warehouse should be able to add more query processing power on an
23 as-needed basis in few seconds as workload grows. It should support thousands of
concurrent queries.

Managed data warehouse should be able to add more query processing power on an
24
as-needed basis in few seconds to support thousands of concurrent users.

Classification: Public
11 | P a g e
AGRICULTURE INSURANCE COMPANY OF INDIA LIMITED
Regd. Office: Plate B&C, 5th Floor, Block 1, East Kidwai Nagar, New Delhi-110023

# Description

Managed data warehouse should be able to allocate the clusters to specific user
25 groups and workloads, and control the number of clusters that can be used on same
data. With additional clusters no change in the application should be required.

Managed data warehouse service should be able to provide automatic


26 recommendations for tuning of data warehouse, cost optimizations and access-based
recommendation for security
Fully Managed Data Warehouse system should be able to leverage machine learning
27 in SQL queries. Few newer reports might require machine learning based output to be
utilized in reports
Fully managed data warehouse service should allow training of ML models with
28
simple SQL like command.
Fully Managed data warehouse should be able to allocate the cluster resources to
specific user groups and workloads, and control the number of clusters that can be
29
used on same data. With additional clusters no change in the application should be
required.
Fully Managed data warehouse service should be able to provide automatic
30 recommendations for tuning of data warehouse, cost optimizations and access-based
recommendation for security.

31 Fully managed data warehouse should allow data sharing across clusters.

Fully managed data warehouse should leverage hardware acceleration techniques in


32
cloud for faster query performance.

33 Fully managed data warehouse should allow data access through APIs as well.

Fully managed data warehouse should automatically add new transient cluster when
34
a configured threshold for workload on primary cluster is high

CSP should have a native serverless service for ETL and data processing tasks. The
35
service should not require any overhead of server or cluster management and tuning

Serverless ETL Service should allow extracting data from relational, non-relational,
36
object data sources
37 Serverless ETL service should support data at petabyte scale
Serverless ETL service should provision, tune and manage required compute
38
resources automatically to run the operations in parallel.
39 Serverless ETL service should support Standard ANSI SQL
Serverless ETL service should support conversion to format required for big data
40
processing without writing code e.g., to ORC, AVRO, Parquet
Classification: Public
12 | P a g e
AGRICULTURE INSURANCE COMPANY OF INDIA LIMITED
Regd. Office: Plate B&C, 5th Floor, Block 1, East Kidwai Nagar, New Delhi-110023

# Description
Serverless ETL service should support granular access control on data and query
41
execution

42 Serverless ETL service should support use of machine learning in data processing tasks

2.1.7. SERVICE NAME: SUPPORT SERVICES

Support
1 Pay-as-you-go The CSP should offer pay-as-you-go pricing (on an hourly
Pricing basis or lesser) where AIC will pay for services by the hour
with no long- term commitments.
2 Cloud Service The CSP should offer monitoring dashboard
Monitoring depicting the availability and performance of cloud
Dashboard resources / services.
3 Audit Trail The CSP should offer Audit Trail feature for account activities
to enable security analysis, resource change tracking, and
compliance auditing.
The CSP should offer recommendations around resource
configurations and security the customer can make to
optimize their financial spend with the provider.
4 Cloud Advisor
The CSP should offer a service acts like a customized cloud
expert and helps provision resources by following best
practices.
Administration
1 Privileged access The CSP should offer fine-grained access controls including,
control conditions like originating IP address, use of SSL certificates,
or authentication with a multi-factor authentication device.
The solution should control access to privilege accounts,
including shared accounts, provide single sign-on (SSO) for
privileged access and delegate, control and filter privileged
operations that an Administrator can execute.
2 API Gateway The CSP should offer a managed service for API security such
as HTTPS/ SFTP hosting and allow configuration of API
throttling.
3 API Calls and User The CSP should offer a service to record history of API calls
Events Tracking and related events for a user account and should support
protection of API’s endpoints over the public internet.
4 Customer VPN The CSP must allow customers to access the cloud service
connectivity via an IPsec VPN tunnel or Secure Sockets Layer (SSL) VPN
Classification: Public
13 | P a g e
AGRICULTURE INSURANCE COMPANY OF INDIA LIMITED
Regd. Office: Plate B&C, 5th Floor, Block 1, East Kidwai Nagar, New Delhi-110023

tunnel over the public Internet.

2.1.8. SERVICE NAME: MANAGED SERVICE FOR QUEUE

1 Queue-based The CSP should offer managed service for queue-based


Messaging messaging.
2 Queue-based The CSP offered managed service for queue should be built
Messaging on 100% open source stack.
2 Scalability and High The offered service should offer cluster mode to support
Availability high availability and scalability.

2.1.9. MANAGED API GATEWAY

1 Availability and The proposed Managed API Gateway should be CSP managed
Scalability and should be highly available (minimum 99.95% availability)
and scalable
2 Supported APIs The proposed Managed API Gateway should support REST,
HTTP and WebSocket APIs.
3 Caching The proposed Managed API Gateway should support 5 GB of
caching

2.1.10. INDEPENDENT 3RD PARTY ASSURANCE PROGRAMS

Requirement Description
1. 3rd party Assurance Programs Cloud provider should meet a broad set of
international and industry-specific compliance
• SOC1 / ISAE 3402
standards: ISO 27001, ISO 27017, ISO 27018, SOC
• SOC2 / SOC3
1, SOC 2, and SOC 3.
• ISO 27001
• ISO 20000
• ISO 27017
• ISO27701

Classification: Public
14 | P a g e
AGRICULTURE INSURANCE COMPANY OF INDIA LIMITED
Regd. Office: Plate B&C, 5th Floor, Block 1, East Kidwai Nagar, New Delhi-110023

• ISO 9001
• PCI DSS Level 1
• FISMA
• FIPS 140-2
• CSA

Classification: Public
15 | P a g e

You might also like