Asset Classification and Logical Access Control Sample Clauses

Asset Classification and Logical Access Control. Braze maintains an inventory of essential information assets such as servers, databases, and information. All Customer Data is classified as Confidential by Xxxxx. Braze adopts the principle of least privilege for all accounts running application or database services, as well as with its own staff. For example, Customer Success Managers only have access to the regions for which they are directly responsible. Braze maintains separate development, staging (or sandbox), user acceptance testing, and production environments access to each environment and within each environment is strictly controlled. Access to Braze’s servers is controlled via revocable SSH keys managed via configuration management and rotated at least annually. All access to Braze’s servers or Customer Data is logged and can only be accessed through Braze’s VPN, which uses multi-factor authentication. Database access is controlled via 32 and 64-character passwords with IP whitelisting. Xxxxx’s HR onboarding and off-boarding processes handle provisioning and de-provisioning of accounts and access.
AutoNDA by SimpleDocs
Asset Classification and Logical Access Control. Braze maintains an inventory of essential information assets such as servers, databases, and information. All customer data is classified as Confidential by Braze. All Braze servers run Ubuntu LTS and Braze adopts the principle of least privilege for all accounts running application or database services, as well as with its own staff. For example, Customer Success Managers only have access to the regions for which they are directly responsible. Braze maintains separate development, staging (or sandbox), user acceptance testing, and production environments access to each environment and within each environment is strictly controlled. Access to Braze’s servers are controlled via revocable SSH keys managed via configuration management and rotated at least annually. All accessing of Braze’s servers or Customer Data is logged and can only be accessed through Braze’s VPN, which uses multi-factor authentication. Database access is controlled via 32 and 64-character password. Braze’s HR onboarding and off-boarding processes handle provisioning and de- provisioning of accounts and access.
Asset Classification and Logical Access Control. PassKit maintains an inventory of essential information assets such as servers, databases, and information. All Customer Data is classified as Confidential by PassKit. PassKit adopts the principle of least privilege for all accounts running application or database services, as well as with its own staff. For example, Customer Success Managers only have access to the regions for which they are directly responsible. PassKit maintains separate development, staging (or sandbox), user acceptance testing, and production environments access to each environment and within each environment is strictly controlled. Access to PassKit’s servers is controlled via revocable SSH keys managed via configuration management and rotated at least annually. All access to PassKit’s servers or Customer Data is logged and can only be accessed through PassKit’s VPN, which uses multi-factor authentication. Database access is controlled via 32 and 64-character passwords with IP whitelisting. PassKit’s HR onboarding and off-boarding processes handle provisioning and de-provisioning of accounts and access.
Asset Classification and Logical Access Control. Insider maintains an inventory of essential information assets such as servers, databases, and information. All Customer Data is classified as Confidential by Insider. Insider adopts the principle of least privilege for all accounts running application or database services, as well as with its own staff. Insider maintains separate development, staging (or sandbox), user acceptance testing, and production environments access to each environment and within each environment is strictly controlled. Access to Insider’s servers are controlled via revocable SSH keys managed via configuration management and rotated at least annually. All access to Insider’s servers or Customer Data is logged and can only be accessed through Insider’s VPN, which uses multi-factor authentication. Database access is controlled via 24-character passwords with IP whitelisting. Insider’s HR onboarding and off-boarding processes handle provisioning and de-provisioning of accounts and access.
Asset Classification and Logical Access Control. Loopy Loyalty maintains an inventory of essential information assets such as servers, databases, and information. All Customer Data is classified as Confidential by Loopy Loyalty. Loopy Loyalty adopts the principle of least privilege for all accounts running application or database services, as well as with its own staff. For example, Customer Success Managers only have access to the regions for which they are directly responsible. Loopy Loyalty maintains separate development, staging (or sandbox), user acceptance testing, and production environments access to each environment and within each environment is strictly controlled. Access to Loopy Loyalty’s servers is controlled via revocable SSH keys managed via configuration management and rotated at least annually. All access to Loopy Loyalty’s servers or Customer Data is logged and can only be accessed through Loopy Loyalty’s VPN, which uses multi-factor authentication. Database access is controlled via 32 and 64-character passwords with IP whitelisting. Loopy Loyalty’s HR onboarding and off-boarding processes handle provisioning and de- provisioning of accounts and access.
Asset Classification and Logical Access Control. Inkit maintains an inventory of essential information assets, such as servers, databases, and information. All Customer Data is classified by Inkit as confidential. All Inkit servers run Ubuntu LTS. Inkit adopts the principle of least privilege for all accounts running application or database services, as well as with its own staff. For example, Inkit’s customer account managers only have access to the regions for which they are directly responsible. Inkit maintains separate development, staging (or sandbox), user acceptance testing, and production environments. Access to each environment and within each environment is strictly

Related to Asset Classification and Logical Access Control

  • Technical and Organizational Measures The following sections define SAP’s current technical and organizational measures. SAP may change these at any time without notice so long as it maintains a comparable or better level of security. Individual measures may be replaced by new measures that serve the same purpose without diminishing the security level protecting Personal Data.

Time is Money Join Law Insider Premium to draft better contracts faster.