Standard Builds. 16.1 Production systems must be deployed with appropriate security configurations and reviewed periodically for compliance with Zoom’s security policies and standards. 16.2 Secure Configuration Availability. Standard security configurations must be established and security hardening demonstrated. Process documentation must be developed, maintained, and under revision control, with management oversight, on a periodic basis. Configurations must include security patches, vulnerability management, default passwords, registry settings, file directory rights and permissions.
Appears in 4 contracts
Samples: Master Subscription Agreement, Data Processing Agreement, Data Processing Agreement