Common use of Network and Logical Security Clause in Contracts

Network and Logical Security. Firewall Security: o Firewalls establish secure gateways. o Logging and address translation are all accomplished at the firewall. o Firewall configurations deny services until successful authentication. o Firewall access is restricted to secure access connections. o Changes to firewalls must be approved. o Configuration changes are monitored daily. o Logging of deny records only. • Web applications within the System are accessible via authorized IPs (not exposed to the Internet) unless otherwise specified in the relevant Order Form. • A security log management system that includes firewall logs is maintained. • Routers and load balancers are configured to allow only necessary protocols to be routed to specific hosts. • Anti-virus software used (Microsoft servers). • Protection from unauthorized access: o Firewalls and routers are controlled via access control lists. o Server configurations record details about accesses. o Privileged access and authentication logs are regularly monitored and reviewed. • System hardening. • Daily threat assessment subscription. • Vulnerability assessment performed on Internet-facing assets. • System patch management - System center configuration manager: o Review, approve, and install patches and security updates as required. • Privileged access for Customer environments: o Quarterly reviews of privileged access; o System administrator access is conducted through a secure connection.

Appears in 4 contracts

Samples: mccmeetingspublic.blob.core.usgovcloudapi.net, mccmeetingspublic.blob.core.usgovcloudapi.net, mccmeetingspublic.blob.core.usgovcloudapi.net

AutoNDA by SimpleDocs
Time is Money Join Law Insider Premium to draft better contracts faster.