Security and Access Management Sample Clauses

Security and Access Management. AWS Managed Services provides Security Management services such as configuring anti-malware protection, intrusion detection and intrusion prevention systems. AWS Managed Services also configures default AWS security capabilities that will be approved by the customer during onboarding, such as Identity Access Management (IAM) roles and EC2 security groups, and uses standard AWS tools (e.g. SecurityHub, Xxxxx, GuardDuty) to monitor and respond to security issues. Customers manage their users via an approved directory service provided by the customer3.
AutoNDA by SimpleDocs
Security and Access Management. Both parties and their agents will have full and ready access to the Management Unit as needed to conduct ongoing operations and to achieve other established mission objectives. The public closure will be maintained, and security will be diligently provided. A system of security and access management will be instituted and documented in distinct Security and Access Management plans. Such plans will be guided by the following agreements on roles and responsibilities. Access Management: The City, in consultation with the Forest Service, will be responsible for developing and implementing an Access Management Plan. The plan will make provision for a private-vehicle identification system; gate, lock and key maintenance; emergency access; and public tour and conservation education activities. The City will also be responsible for access management infrastructure including keys, gates, and locks, for the Management Unit.
Security and Access Management. 1. The S-BSS shall provide Security Management comparable to the 3GPP 32.371 v6.2.0 specification for Security Management. Confidential treatment has been requested for portions of this exhibit and such portions have been filed separately with the Commission. The copy filed herewith omits the information for which confidential treatment has been requested and replaces it with [***]. AMENDMENT 4 TerreStar Satellite Base Station Subsystem Functional Requirements
Security and Access Management. Xxxx has implemented and will maintain high security practices, procedures and safeguards with respect to the Services, including a password policy and other technical and organizational safeguards against accidental, unlawful or unauthorized access to or use, destruction, loss, alteration, disclosure, transfer or commingling of Customer Confidential Information, which are equal to or better than applicable industry practices and standards. With limiting the foregoing, Bell will maintain all Customer Confidential Information in its Canadian data centres, protected by a combination of robust hardware and software, physical security and 24/7 monitoring.
Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!