PROPOSAL OF SERVICES FOR PURCHASE COLLEGE FOUNDATION | Page 18
In order to maintain this security infrastructure and track and monitor any potential exposures to
minimize any impact to our clients, we apply the following key controls:
• Physical infrastructure security
• Architecture components
• Endpoint detection and response
• Incident detection and response
• Distributed denial of service (DDOS)
• Threat intelligence
• Data leak management
• Encryption
• Auditing and regulation/compliance
• Secure workspace
• Threat matrix
• Administrative activity and configuration monitoring
• Ethical hacking and penetration studies
• Hardening standards
• Vulnerability management
• Enterprise automated defense
• Security awareness
• Web application firewall