System Architecture meets architecture reference standards (Best Practices)
• System went through CMS Technical Review Board (TRB) for architecture and security review
• Three tier zone architecture (presentation, application and data zones)
• Communication flows only between adjacent zones or within a single zone
• Three environments (production, validation and development)
• High availability through replication in multiple cloud regions
• High performance through virtualization and cloud computing
• Best practice, System Development Life Cycle (SDLC) is used for all IT projects (requirements gathering, design, development, testing, validation, maintenance, and disposal)
• Twenty-Four by Seven Infrastructure Monitoring
• System documentations are maintained and updated accordingly
• No co-hosting of production and non-production
Security Is Prioritized above Agility
• Access Control and Management: Limit information system access to authorized users, to processes acting on behalf of authorized users, or to devices (including other information systems).
• Audit and Accountability: Create, protect, and retain information system audit records to enable the monitoring, analysis, investigation, and reporting of unlawful, unauthorized, or inappropriate information system activity.
• Configuration Management: Ensure changes to the system are reviewed, documented, and approved (Prevent unauthorized changes).
• Identification and Authorization: Use of strong factor of authentication to restrict access to only authorized users, processes acting on behalf of users, or devices.
• Security Assessment and Authorization: Periodically assess the security controls in information systems to determine if the controls are effective. Implement plans of action designed to correct deficiencies and reduce or eliminate vulnerabilities.
• System and Communications Protection: Monitor, control, and protect communications within and outside of the system (Ensure confidentiality- Encryption at rest and in transit).
• System Integrity: Identify, report, and correct information and information system flaws in a timely manner.
• FISMA, HIPAA, PCI-DSS and ISO Compliant Environments.