Serves used for corporate services like identity
and directory services (AD), mails, domain controller, proxies,
web, IPS, IDS, Firewalls etc. or business delivery like
databases, ERPs, web servers, application servers etc. are
hardened based on TechM group policy or client provided policy
and controls.
All servers are securely placed in server rooms or data
centers across TechM locations. Server administration is
configured for two factor authentications configured and
monitored through privileged identity management (PIM) or
privileged access management (PAM) tools. All server event must
be monitored though SIEM (Security Information and Event
Management) or log monitoring tools. Servers are periodically
security and risk assessed and audited for security.
What is required to move a server
or service into Tech Mahindra Network.
- Vulnerability Assessment of Server or Service including
review of its Security Configurations and hardening level
- Security assessment of Production Setup and Devices
- Technical Risk Assessment of the solution of which the
Server or Service is part of.
- Closure Certificate issued by ISG TechSec. Exceptions
approval with duly approved Risk Acceptance Document (RAD)
For Security Assessments, a hub request to be raised by
system owner
ISG >> ISG - Service Request >>
S-066-Event Based VA and PT / WAPT Request |