Note: This service is only available to the consolidated agencies.
Advanced Persistent Threat (APT) Protection
Service Description
Advanced Persistent Threat (APT) is a solution to identify and
block zero-day web exploits, binaries and multi-protocol callbacks to help CoPA scale their advanced threat defenses. The selected APT solution set includes network visibility fabric, deep session inspection and SSL decryption as well as forensic integration and packet capture technologies. The solution also includes an endpoint software that is deployed to approximately 80,000 servers and desktops. Verizon is a key service provider since a majority of the solution is deployed at their colocation space in Pittsburgh and managed network egress points in Harrisburg.
What is Included
The solution generates alerts that EISO sends to agencies as security incidents they are required to remediate.
In most cases, triage activities such as blocking the IP address or URL that triggered the alert is requested by EISO and implemented by ETSO.
Service Levels
None
Additional Information
Additional information about APT can be found at https://itcentral.pa.gov/Security/Pages/default.aspx
Service Description
Application code is scanned as it is being developed to reveal security vulnerabilities and errors before code is released in a production environment.
What is Included
Application Source Code Scanning
Service Levels
Priority Levels and Allowable Response Times:
Critical– within 30 minutes to respond to customer
High– up to 8 hours to respond to customer
Medium– up to 24 hours to respond to customer
Low– up to 48 hours to respond to customer
“Response Time” is defined as the time between receipt of the call and/or ticket and the time that work on the problem begins. Due to the wide diversity of problems that can occur, and the
methods needed to resolve them, response time is not defined as the time between the receipt of a call and/or ticket and problem resolution.
Availability Service Level Objective:
Target 99% uptime.
Additional Information
Reference documents which provides more in-depth details of this service are available at
www.cybersecurity.state.pa.us