1
SFTP Implementation Requirements SFTP Extensions to SSH protocol (no SCP) SSH v2 protocol only RSA/DSA authentication only (no static passwords) Dedicated identity management process: User Create/Update/Delete Key management – create, expire, revoke Identity/credential verification and audit Real-time monitoring & log management Deterministic audit plan for both market and internal audits Deterministic maintenance schedule Defined availability requirements that can accommodate regular maintenance Availability of development, test, and certification instances of each infrastructure component Defined test criteria, acceptance criteria, and certification criteria to enable regular maintenance and validate system changes Availability of incidental support resources to handle outages, interruptions, incidents, and maintenance Regular external security assessments

SFTP Implementation Requirements

Embed Size (px)

DESCRIPTION

SFTP Implementation Requirements. SFTP Extensions to SSH protocol (no SCP) SSH v2 protocol only RSA/DSA authentication only (no static passwords) Dedicated identity management process: User Create/Update/Delete Key management – create, expire, revoke - PowerPoint PPT Presentation

Citation preview

Page 1: SFTP Implementation Requirements

SFTP Implementation Requirements• SFTP Extensions to SSH protocol (no SCP)• SSH v2 protocol only• RSA/DSA authentication only (no static passwords)• Dedicated identity management process:

– User Create/Update/Delete– Key management – create, expire, revoke– Identity/credential verification and audit

• Real-time monitoring & log management• Deterministic audit plan for both market and internal audits• Deterministic maintenance schedule• Defined availability requirements that can accommodate regular

maintenance• Availability of development, test, and certification instances of each

infrastructure component• Defined test criteria, acceptance criteria, and certification criteria to

enable regular maintenance and validate system changes• Availability of incidental support resources to handle outages,

interruptions, incidents, and maintenance• Regular external security assessments