Application Availability. All applications should be designed to minimize the risk from denial-of-service attacks. • All applications should limit resources allocated to any user to the minimum necessary toperform the task. • All applications must prevent unauthenticated users from accessing data or using vital system resources.
Appears in 2 contracts
Samples: Processing and Security Agreement, Processing and Security Agreement
Application Availability. ▪ All applications should be designed to minimize the risk from denial-of-denial of service attacks. • ▪ All applications should limit resources allocated to any user to the minimum necessary toperform to perform the task. • ▪ All applications must prevent unauthenticated users from accessing data or using vital system resources.
Appears in 1 contract
Samples: Enterprise Supplier
Application Availability. All applications should be designed to minimize the risk from denial-of-denial of service attacks. • All applications should limit resources allocated to any user to the minimum necessary toperform to perform the task. • All applications must prevent unauthenticated users from accessing data or using vital system resources.
Appears in 1 contract
Samples: Enterprise Supplier