10.10.2014 Views

Policy 7230A - Department of Administration

Policy 7230A - Department of Administration

Policy 7230A - Department of Administration

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

12.1.1.3 Required Test and Validation Procedures<br />

To allow for independent testing and validation <strong>of</strong> vendor claims<br />

regarding the security capabilities <strong>of</strong> the solution, all acquisition<br />

documents must specify that the vendor must provide the testing and<br />

validation methodology and process used during solution<br />

development:<br />

• Include request for indication <strong>of</strong> the test and validation<br />

process used for the solution.<br />

• Review all documents prior to issuance to ensure test and<br />

validation requirements have been included.<br />

12.1.1.4 Required Documentation<br />

To allow for thorough independent review <strong>of</strong> all aspects <strong>of</strong> the<br />

requested solution, all acquisition documents must specify that<br />

complete system documentation is provided:<br />

• Include request for solution documentation:<br />

o Solution implementation and configuration<br />

documentation.<br />

o Solution operation documentation.<br />

• Review all documents prior to issuance to ensure solution<br />

documentation requirements have been included.<br />

12.1.2. Ensure Responses Include Required Information<br />

All responses to RFP, RFI and RFQ documents should include the requested<br />

security information as well as sufficient system documentation to allow for<br />

independent verification <strong>of</strong> the security claims made:<br />

12.1.2.1 Security Capabilities<br />

To ensure that solutions that are acquired rather than developed<br />

meet the Agency’s security requirements, all acquisition document<br />

responses must specify the security capabilities <strong>of</strong> the proposed<br />

system:<br />

• Review responses to ensure that specified security capabilities<br />

are detailed.<br />

• Weight those responses that include the requested<br />

information positively and those that do not include<br />

requested information negatively.<br />

12.1.2.2 Design and Development Process<br />

To ensure that solutions have been constructed using a methodology<br />

that provides definable, consistent and measurable security<br />

capabilities, all acquisition document responses must specify the<br />

solution design and development processes used during the creation<br />

<strong>of</strong> the proposed system:<br />

43

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!