Security Gateways. 20. For access to Security Gateways ensure that user authorization levels to administer and manage Security Gateways are appropriate, and that all rule sets either explicitly or implicitly “DENY ALL” inbound access except where there is a business need, and then with strong authentication. For access to In-Scope Information and for host devices that support it, assign unique credentials (eg. UserIDs, passwords) to authorized individual users, assign individual ownership to system service accounts, and ensure that system service accounts are not shared by administrators. Wireless Networking
Appears in 4 contracts
Samples: Mso Dealer Agreement, Commercial Dealer Agreement, Directv Smatv Dealer Agreement