Best Of DPI Consulting
Security Access and Vulnerability Testing
PROJECT BRIEF:
Provide security consulting to ensure Optus devices (firewalls / laptops etc) are used to facilitate logical access (e.g. serial or telnet access) to the solution by the vendor or its agents within Optus facilities.
Ensure devices are sanitised after use or at a regular interval.
Implement dedicated virtual terminal.
Implement 3rd party review of all vulnerabilities prior to granting access to Optus network. This included imposing stringent firewall rules/policies, end point protection, vulnerability mitigation and only allow identified protocols
NOMINATED ICT SERVICES SCHEME SUB-CATEGORY. REFER TO CATEGORIES AND DESCRIPTIONS ON THE ICT SERVICES PAGE ON WWW.PROCUREPOINT.NSW.GOV.AU
K04 Security and firewall management including delivery “as a service”
Sydney
$75000
Dec 2015
March 2016
Optus
Write Security policy for Optus ICT environmentg
PROJECT BRIEF
Implement new policy framework including the review and approval of policy development across the organisation for ISO 27001 Audits.
Review and mature existing IT policies, guidelines and procedures.
Review the risk management, framework and supporting policies, guidelines and processes to ensure adequate systems of control are in place which are routinely performed, are effective and comply with legislative requirements, best practice and relevant ISM / PSM / PCI standards.
Assist with the coordination of external audits like 27001/2
NOMINATED ICT SERVICES SCHEME SUB-CATEGORY. REFER TO CATEGORIES AND DESCRIPTIONS ON THE ICT SERVICES PAGE ON WWW.PROCUREPOINT.NSW.GOV.AU
K01 Security strategy including delivery “as a service”
Sydney
$75000
Dec 2015
April 2015
Optus
Undertake Deployment of Cisco ISE for NBN environment and ensure that testing meets agreed standards
PROJECT BRIEF:
Manage the planning and delivery of complex and/or large scale ICT projects such as the Cisco ISE implementation across NBN.
Switch and Wireless LAN Controller Configuration.
- Required to Support Cisco ISE Functions.
- Ensure Cisco ISE is able to interoperate with network switches.
Configure network switches with the necessary NTP, RADIUS/AAA, 802.1X, MAB, and other settings for communication with Cisco ISE.
Enable Your Switch to Support Standard Web Authentication.
Define a Local Username and Password for Synthetic RADIUS Transactions.
Set the NTP Server to Ensure Accurate Log and Accounting Timestamps.
Enable AAA Functions.
RADIUS Server Configuration.
Configure Switch to Send RADIUS Accounting Start/Stop to Inline Posture Nodes.
Enable RADIUS Change of Authorization (CoA).
Enable Device Tracking and DHCP Snooping.
Enable 802.1X Port-Based Authentication.
Use EAP for Critical Authentications.
Throttle AAA Requests Using Recovery Delay.
Define VLANs Based on Enforcement States.
Define Local (Default) ACLs on the Switch.
Enable Cisco Security Group Access Switch Ports.
Enable EPM Logging.
Enable SNMP Traps.
Enable SNMP v3 Query for Profiling.
Enable MAC Notification Traps for Profiler to Collect.
Configure the RADIUS Idle-Timeout.
Set Up Wireless LAN Controller for iOS Supplicant Provisioning.
FIPS Support on Wireless LAN Controller with Inline Posture Node.
Troubleshoot on 802.1x.
NOMINATED ICT SERVICES SCHEME SUB-CATEGORY. REFER TO CATEGORIES AND DESCRIPTIONS ON THE ICT SERVICES PAGE ON WWW.PROCUREPOINT.NSW.GOV.AU
K02 Security management security and firewall installation including delivery “as a service”
Sydney
$55000
Aug 2014
Aug 2014
NBNCo
SIEMS Implementation for Dataengine environment
PROJECT BRIEF
DataEngine infrastructure had no uniform way of monitoring customers logs for operational intelligence. Customer business generated massive volumes of data every millisecond of every day. This machine data contains a definitive record of all user transactions, customer behavior, machine behavior, security threats, fraudulent activity and more. DPI Consulting was responsible for 3 tier implementation ( Search head / Indexer / Forwarder) of Splunk to co-relate data for operational intelligence and put alerts on the dash for Tier -1 security analyst.
Manage and administer.
- Splunk, Arcsight, SSLVPN, ASA firewall and Sourcefire appliances.
- F5 LTM, ASM and APM, iRules.
- PKI, HSM, Remote access.
- Proxy servers / web servers.
Manages operational and project risks proactively, ensuring existing and emerging risks are identified and effective risk mitigation strategies are implemented.
Undertake systematic monitoring and scanning of the enterprise’s external environment to identify emerging technologies that have the potential to create value.
Develop and implement project management plans and reporting streams to ensure and track project success.
NOMINATED ICT SERVICES SCHEME SUB-CATEGORY. REFER TO CATEGORIES AND DESCRIPTIONS ON THE ICT SERVICES PAGE ON WWW.PROCUREPOINT.NSW.GOV.AU
K02 Security management security and firewall installation including delivery “as a service”
Sydney
$85000
Dec 2015
Feb 2016
Data Engines
Audit that suppliers must comply with the physical and logical security requirements set out in the Commonwealth Protective Security Manual (PSM) and ISM
PROJECT BRIEF:
The work involved DPI Consulting to ensure that Boral Physical and logical security requirements have been accredited according to AS/NZS 17799.2:2003 “Information security management, Part 2 Specification for information security management systems and ISO9001 2000.
Review Boral physical security policy describes procedures that apply within Boral and includes plan for following areas.
- Reception areas
- General office areas
- Computer/Communications rooms
- Warehouse/Storage areas
- Data processing areas
- Loading docks
- Utility areas
- External storage areas
Review the computer storing the data is located in a secure area and data retention is agreed as per customer requirement.
Access to computer room is restricted to those staff members or third parties with a specific requirement as defined by their job specification. All visitors to computer/communications rooms are escorted at all times by a Boral staff member unless cleared to act without supervision. Logical access controls like electronic cards/tokens (swipe or proximity), Login name / complex password, encryption protect access to all computer/communications.
NOMINATED ICT SERVICES SCHEME SUB-CATEGORY. REFER TO CATEGORIES AND DESCRIPTIONS ON THE ICT SERVICES PAGE ON WWW.PROCUREPOINT.NSW.GOV.AU
K03 Security testing including delivery “as a service
Sydney
$44000
Sep 2015
Dec 2016
Boral

