Secure Hosting. We utilize an Infrastructure as Code (IaC) process. This gives us a good overview on our cluster and security rules. In this container-based architecture we have rules in place for firewalls, patch/package management, vulnerability scans, health monitoring and alerting, and so on.
Appears in 4 contracts
Samples: Data Processing Agreement, Data Processing Agreement, Data Processing Agreement
Secure Hosting. We utilize an Infrastructure as Code (IaC) processproces. This gives us a good overview on our cluster and security rules. In this container-based architecture we have rules in place for firewalls, patch/package management, vulnerability scans, health monitoring and alerting, and so on.
Appears in 2 contracts
Samples: Processor Agreement, Processor Agreement