Electronic, Electromechanical And Electrotechnical Supplies – Neubeschaffung Switche-Wlan Aps-Nac Technik. The Central Institute For Mental Health Intends, As Part Of This Procedure, The Award To A Bidder For The Delivery And Implementation Of Active Components Switch-Wlan Aps Nac Including Conceptual Position And Asks For The Submission Of Offers. Introduction The Central Institute For Mental Health (Zi-Mannheim) Intends To Obtain Components That Meet The Strict Requirements Of The Federal Office For Information Technology (Bsi) For Critical Infrastructures (Criticism). These Requirements Are Designed To Ensure The Safety And Integrity Of The Systems In Critical Infrastructures And Thus Ensure The Protection Of Sensitive Data And The Availability Of Essential Functions. In This Chapter, The Specific Requirements For The Components To Be Delivered Are Described In Detail. Safety Certifications The Components Must Demonstrate Corresponding Security Certifications That Correspond To The Bsi-Critis Requirements. These Include: • Common Criteria (Cc): Components Should Be Certified For It Security According To The Common Criteria, At Least At Eal 2 Or Higher. • Bsi-It Basic Protection: Components Must Meet The Requirements Of The It Basic Protection Or Implement Corresponding Security Measures According To The Bsi Basic Protection Standard. Access Control And Authentication • Access Controls: The Components Must Provide Robust Mechanisms For Access Control. This Includes Support For Multi-Factor Authentication (Mfa) And Roll-Based Access Controls (Rbac). • Protocol And Monitoring: Every Access To The Components Must Be Logged To Ensure Traceability. Detailed Logs Must Be Created That Can Be Checked And Evaluated Regularly. Protection Against Malware And Cyber Attacks • Antivirus And Anti-Malware Protection: The Components Must Contain Protective Mechanisms Against Viruses, Malware And Other Threats Or Be Compatible With Such Mechanisms. • Weakness Management: There Must Be Continuous Weakness Management, Including Regular Updating And Patching Of The Systems. Data Integrity And Confidence • Encryption: All Sensitive Data Must Be Encrypted Both During Transmission And Storage. The Encryption Protocols Must Correspond To The Current Security Standards (E.G. Aes-256). • Integrity Tests: The Components Must Offer Mechanisms To Ensure Data Integrity In Order To Prevent Manipulation And Recognize It Early. Company Continuity Redundancy And Reliability • Redundant Systems: The Components Must Have Redundancy Mechanisms In Order To Avoid Failures. This Can Be Achieved Through Redundant Hardware, Network Nodes Or Communication Channels. • Emergency Recovery: It Mü
We takes all possible care for accurate & authentic tender information, however Users are requested to refer Original source of Tender Notice / Tender Document published by Tender Issuing Agency before taking any call regarding this tender.