Skip to main content

PCI / SSAE – Record of Compliance

Leading Business Connectivity.

Broadband
Connections

Private MPLS, SD-WAN and Internet Connections for business customers

Voice
Services

Voice Lines or Cloud PBX Voice Services to replace your old phone system

Physical and Network
Security

Monitor, alert and protect your facility and network

Colocation
Facilities

Full or Partial Cabinets in a highly connected, private and Secure Data Centre

Frontier Networks Inc. (FRONTIER) and our network is neither a payment processor nor is it a public network unless specified elsewhere by means of our design. We provide for private point to point services between subscribing locations (corporate head office and remote branch office locations). The IP address scheme provided to each of the subscribing locations honors the ‘internal’ network that is extended by the CUSTOMER through the FRONTIER provided network to the subscribing end points.

In some cases, where the design accommodates this, we may use firewall and VPN policies to provide an additional layer of encryption and packet encapsulation over the existing already private network.

CUSTOMER may, by means of their design, may provide for transport from their Internal Network to a Payment Processesor via the public Internet.

The following terminology extends the existing Master Services Agreement (MSA) and provides for additional responsibilities to be performed by, or accommodated by FRONTIER.

Special Terms:

During the term of the CUSTOMER SERVICES AGREEMENT FRONTIER will provide, at no charge the annual Statement of Compliance documentation to support the CUSTOMER requirement for PCI compliance.

Our updated Statement of Compliance (SOC) documentation is noted below of this schedule.

Special Terms of MSA included in this Schedule.

  1. Customer acknowledges that FRONTIER is not a credit card processor nor does it, itself store CUSTOMER Cardholder Data, or has the ability to control or impact the security of CUSTOMER Cardholder Data, the Processor warrants and undertakes that it will: provide to CUSTOMER a copy of its current DRAFT Statement of Compliance (SOC) within 30 days of the date of this Agreement.
  2. FRONTIER agrees to notify CUSTOMER in the most expedient time possible under the circumstances and without unreasonable delay if at any time FRONTIER becomes aware that it is no longer adhering to the SOC as provided below
  3. FRONTIER agrees to provide to CUSTOMER a copy of its current plan for its annual SOC review and if not compliant, the projected date by which it will be compliant, within 30 days of the date of this Agreement and on an annual basis thereafter for the duration of this Agreement.
  4. FRONTIER agrees to act in the best interest of the CUSTOMER to comply with the Payment Card Industry Data Security Standard in respect of the CUSTOMER  Cardholder Data by adhering to the proposed SOC;
  5. FRONTIER agrees notify CUSTOMER in the most expedient time possible under the circumstances and without unreasonable delay upon discovering that CUSTOMER Cardholder Data was, or is reasonably believed to have been, acquired or accessed by an unauthorized person; and be responsible for compliance with any agreed specific control objectives.

Control Objective 1 – Physical Security

Controls provide reasonable assurance that physical access to the company’s data centers is restricted to authorized and appropriate personnel. It would be here that we note that our 151 Front Street facility is leased through Allied Properties REIT and their registered pursuant to – ISO/IEC 27001:2013

Item

Controls Specified by Company

Test Requirements

1.1

The   company has a physical security program in place. The   company has physical security access policies to determine if they include   procedures for monitoring, authorizing, and approving physical access   privileges to the data center for visitors, contractors, and employees.

1.2

Physical   access to the company’s facilities is restricted to authorized personnel. Company’s   facilities are restricted to authorized personnel and access to restricted   areas is secured through an access badge system.For   new users, documentation is present indicating if appropriate approvals were   obtained prior to granting access to restricted areas.Quarterly   data center access reviews are documented, and performed. Instances of inappropriate   access are identified, investigated and removed.

1.3

Visitor   access to the data centers is restricted to visitors who are preapproved by a   company sponsor. Visitors must be escorted at all times.

Visitors are required to sign the visitors register   upon entry to the data center / raised floor areas and are to be escorted by   company personnel at all times.

1.4

An   access badge system has been implemented for restricted areas. Access   control policy for restricted areas should be in place indicating that an   access badge system is to be implemented for all restricted areas.Implementation   of access badge system should be observable.Effectiveness   of access badge controls should be observable   (i.e. unauthorized personnel should be   denied access)

1.5

The   data centers are manned by security personnel on a 24 x 7 basis and are   monitored using CCTV.Emergency   exits are equipped with alarms. When accessed, an alert is sent to security   control. Policy   is in place indicating the requirement for the use of cameras to monitor   sensitive areas.Contract   with a third party security service provider includes the requirement for   restricted areas to be manned by security personnel on a 24 x 7 basis.Monitoring   of restricted area should be implemented in accordance with policies and   contract. (i.e. At least one security guard, CCTV in place)

Emergency   exit doors are properly equipped with the specified controls, and are   operational.

Control Objective 2 – Environmental Safeguards

Controls provide reasonable assurance that measures to prevent likely disruptions to processing at data centers are in place and operational.

Item

Controls Specified by Company

Test Requirements

2.1

Raised   floors are in place to prevent water damage and to provide circulated   air-flow to the computing equipment. Management   is aware of the controls in place.Controls   are in existence, observable, and operational.

2.2

Sensitive   areas of the data center buildings are protected with fire detection and fire   suppression equipment. Fire   detection and suppression equipment are located throughout the data centers, smoke   detection devices are located in the ceiling and sub-flooring within the   raised floor areas, and a staged detection system is in place.Management   is aware of the controls in place.Controls   are in existence, observable, and operational.

2.3

Air-conditioning   systems maintain the correct atmospheric conditions in the computing   environment and prevent over-heating of operating equipment to reduce   failure. Air-conditioning   systems are in place to monitor and maintain safe atmospheric conditions for   the computing environment.Policy   is in place requiring that air-conditioning systems are to be in place to   maintain the correct atmospheric conditions in the computing environment,   including safe temperature and humidity levels.Management   is aware of the controls in place.

Controls   are in existence, observable, and operational.

2.4

Generators   provide backup power for critical areas of the data centers. Management   is aware of the controls in place.Controls   are in existence, observable, and operational.

2.5

Uninterruptible   backup power modules are in place in the event of a power failure and   generators are inoperable. Management   is aware of the controls in place.Controls   are in existence, observable, and operational.

2.6

Equipment   including air conditioning, backup power modules, generators and transfer   switches exist in a redundant architecture. Management   is aware of the controls in place.Physical   hardware and power schematics should determine that these controls are in   existence, observable, and operational.

2.7

Preventative   maintenance is performed to maintain the continued operability of equipment. Preventative   maintenance schedules are maintained by management for critical environmental   equipment in the data centers.Facilities   service agreement related to the maintenance of critical environmental   equipment should cover the period under examination and includes coverage   for:

  • Generators
  • UPS   systems
  • Battery   arrays
  • HVAC   systems
  • Fire   suppression systems

Preventative maintenance schedules should be supported by work   orders, and/or completed compliance reports to document the completion of   preventative maintenance of critical equipment.

Control Objective 3 – Incident Management

Controls provide reasonable assurance that significant operations incidents are identified, recorded, and tracked through resolution.

Item

Controls Specified by Company

Test Requirements

3.1

A   process has been established for providing ongoing support for user entities,   including incident identification, recording, communication, escalation,   confirmation, resolution, and measurement. Management   is aware of the controls in place.Incident   management policies and procedures include procedures for the identification,   recording, communication, escalation, confirmation, resolution, and   measurement of incidents.

3.2

Tools   are used to monitor, escalate, record, and analyze IT system incidents. Management   is aware of the controls in place.Tools   are in place to monitor, escalate, record, and analyze IT system incidents.

3.3

Significant   operations incidents are tracked through resolution. Management   is aware of the controls in place.Closed   significant operations incident tickets should be supported by ticket details   with the completed record reporting the following details:

  • Systems   affected
  • Priority/urgency
  • Resolution

Control Objective 4 – Change Management

Controls provide reasonable assurance that operating system, hardware, network device, and job scheduling changes are performed in accordance with company policy to prevent unauthorized changes.

Item

Controls Specified by Company

Test Requirements

4.1

A   change control process exists for operating system, hardware, network device,   and job scheduling changes. Management   is aware of the controls in place.Change   control policies and procedures include requirements for approval, testing,   implementation, and documentation of operating systems, hardware, networks   device, and job scheduling changes.

4.2

Normal   and emergency changes are tested based upon documented testing plans. Management   is aware of the controls in place.Completed   normal and emergency changes have supporting documentation (including ticket   details) to show that change was appropriately tested based upon documented   test plans.

4.3

Normal   and emergency changes are approved by authorized approvers. Management   is aware of the controls in place.Normal   and emergency changes have supporting documentation to show approval by an   authorized approver prior to implementation.

4.4

Change   control functions are segregated to prevent incompatible job functions from   being performed by one person. Management   is aware of the controls in place.Change   control policies and procedures include requirements for change control   functions to be segregated to prevent incompatible functions from being   performed by one person.Normal   and emergency changes have supporting documentation to show that the approval   and implementation functions were performed by different individuals.

Control Objective 5 – Network Access

Controls provide reasonable assurance that logical access to the company’s network is restricted to authorized and appropriate users for authorized uses.

Item

Controls Specified by Company

Test Requirements

5.1

All users requiring access to the company’s   internal systems must first have a record of employment in the human resource   management system.User credentials are created, account and   password information are securely communicated to each user on their start   date.The password is pre-expired, so each user must   change the temporary password to a password known only to them at first   logon. Management   is aware of the controls in place.Each   new hire’s information is recorded in the human resource management system and   appropriate access is granted to the new hire.Passwords   are configured to be pre-expired so that users are required to change the   password on initial login.

5.2

When   initially signing on to company computer, a non-trespass message is   displayed. Management   is aware of the controls in place.Controls   are in existence, observable, and operational.

5.3

Domain   security controls include password configuration settings for an appropriate   minimum password length, expiration frequency, and the number of consecutive   unsuccessful logon attempts before the account is suspended. If a user fails   to enter a valid user ID and password, the security screen is redisplayed   prompting the user to enter the user ID and password again. Management   is aware of the controls in place.Password   management standards are in place, indicating password requirements for a   minimum length and expiration frequency consistent with requirements for   complexity.Domain   security controls include password confirmation settings requiring the   following (if applicable):

  • Minimum   Password Length
  • Password   Complexity
  • Password   Expiration
  • Unsuccessful   Login Attempts
  • Reset   Counter
  • Lockout   Duration

User   attempts to change the domain password to a non-compliant password   construction are denied the password change.

Entry   of an invalid user ID and password redisplays the security screen prompting   the user to enter the user ID and password again.

5.4

Users   who have forgotten their password have multiple options for obtaining a new   password. All of these options require that the users authenticate themselves   or they send a temporary password to a company controlled mailbox/voicemail   system. All temporary passwords are required to be changed at first use. Management   is aware of the controls in place.User   attempts to request a temporary password online require user authentication, or   the password is sent to a company controlled mailbox/voicemail system.Password   configurations for temporary passwords require users to change the password   on initial login.

Item

Controls Specified by Company

Test Requirements

5.5

Policy,   procedure, and standard build documents contain the required minimum   standards for configuration and deployment for network devices such as   firewalls and routers on the company network. Network diagrams also exist to   present a pictorial representation of the network infrastructure in place. Management   is aware of the controls in place.Policy,   procedure, and standard build documents include the required minimum   standards for the configuration and deployment of network devices such as   firewalls and routers.Network   diagrams are in place to provide a pictorial representation of the network   infrastructure present.

5.6

Firewall   devices have been deployed to restrict access to the computing environment   and enforce boundaries between network compartments. Management   is aware of the controls in place.Company   policy includes procedures for the installation, configuration and enablement   of firewalls.Logical   network diagrams show firewalls are in place to restrict access to the   computing environment and enforce boundaries between network compartments.

Configuration   of firewall devices enforces the boundaries between network compartments and   restricted access to the computing environment.

5.7

Automated   tools are used for network monitoring and management. Management   is aware of the controls in place.Controls   are in existence, observable, and operational.

Item

Controls Specified by Company

Test Requirements

5.8

Intrusions   and attempted intrusions are detected and prevented by automated software installed.  Network monitoring and management tools are   configured to issue alerts to predefined support groups when critical   operations or security conditions are detected. Management   is aware of the controls in place.Malware   protection policy is in place, requiring the installation of intrusion   prevention and detection tools.Policy   servers distribute traffic filtering definitions for the company.

End   users cannot permanently disable traffic filters.

A   workstation’s configuration is configured with traffic filtering definitions   in compliance with company policy.

Alerts   are issued to predefined individuals or an incident ticket is created when   critical operations or security conditions are detected.

5.9

Antivirus   software is installed on company systems. Management   is aware of the controls in place.Anti-virus   is observable on company desktops.Virus   definition policy servers distribute virus definitions and enforce antivirus   configurations for the company.

End   users cannot permanently disable virus protection.

A   workstation’s configuration is configured with antivirus definitions in   compliance with company policy

Updates   are automatically obtained from a policy server.

5.10

Access   to the company network requires multiple layers of authentication in order to   obtain access to the user entity’s environment. Management   is aware of the controls in place.Controls   are in existence, observable, and operational.User   attempts to access without having authenticated through multiple layers are   not granted access.

5.11

Authentication   requirements to access management compartments comply with established company   policies. Management   is aware of the controls in place.Company   policies outline a structure of secured access to management compartments,   enforced through the use of an authentication system (i.e. badge ID, unique   PIN)Controls   are in existence, observable, and operational.

5.12

Users   are granted access to network devices and the corresponding management   compartments based upon job responsibilities.Upon   termination, an employee’s access to network devices and management   compartments is immediately disabled. Management   is aware of the controls in place.Users   and managers/approvers are identified in the company employee directory for   the following actions:

  • Granting access approval
  • Creation of management compartment account for a   user and subsequently requesting approval from direct manager

Users   granted access to management compartments have supporting documentation to   determine the access was approved by management.

Accounts   are configured to be expired after a set amount of time, unless revalidated   as appropriate by the user’s manager.

The   above controls are in existence, observable, and operational.

Control Objective 6 – Data Backup

Controls provide reasonable assurance that data is backed up regularly and available for restoration in the event of processing errors and unexpected processing interruptions.

Item

Controls Specified by Company

Test Requirements

6.1

Backups   are conducted in accordance with company policies and procedures. Management   is aware of the controls in place.Servers   being backed up are configured to backup in accordance with company policies   and procedures.

6.2

Backups   are performed using automated software, are monitored for successful   completion, and failed backups are re-run when necessary. Management   is aware of the controls in place.Backup   logs are present to determine the status of backups is monitored using   automated software, and that failed backups are re-run when necessary.

6.3

Tape   backups are prepared for transit to an off-site facility when required. Management   is aware of the controls in place.Daily   tape checklists are present to determine tapes were picked up and/or dropped   off at the data center.

6.4

A   process is used to track the location of all backed up files. Management   is aware of the controls in place.Controls   are in existence, observable, and operational.

Looking for support?
Want to Log-in to review your bill?
Do you want to escalate a ticket?

Do it all from here!

It’s Time.
Let’s Build A Network Together!

1.866.833.2323