Virtualized System. All Intrusion Detection Systems in place should be configured to provide data on demand,to identify sources of a potential attack/intrusion at the network perimeter. • Systems should have the ability to detect a potential hostile attack. Examples include but are not limited to: Network Intrusion Detection or Host Intrusion Detection/Prevention. • Any single image of data classified as Confidential defines the minimum-security requirement for all virtual instances on the same host system. • Virtualized systems may contain data classified as Confidential Information. (c) Applications thatrequire physical separation cannot be on the same host system.
Appears in 2 contracts
Samples: Data Processing and Security Agreement, Data Processing and Security Agreement
Virtualized System. ▪ All Intrusion Detection Systems in place should be configured to provide data on demand,, to identify sources of a potential attack/intrusion at the network perimeter. • ▪ Systems should have the ability to detect a potential hostile attack. Examples include but are not limited to: Network Intrusion Detection or Host Intrusion Detection/Prevention. • ▪ Any single image of data classified as Confidential defines the minimum-minimum security requirement for all virtual instances on the same host system. • ▪ Virtualized systems may contain data classified as Confidential Informationconfidential data. (c) Applications thatrequire that require physical separation cannot be on the same host system.
Appears in 1 contract
Virtualized System. All Intrusion Detection Systems in place should be configured to provide data on demand,, to identify sources of a potential attack/intrusion at the network perimeter. • Systems should have the ability to detect a potential hostile attack. Examples include but are not limited to: Network Intrusion Detection or Host Intrusion Detection/Prevention. • Any single image of data classified as Confidential defines the minimum-minimum security requirement for all virtual instances on the same host system. • Virtualized systems may contain data classified as Confidential Informationconfidential data. (c) Applications thatrequire that require physical separation cannot be on the same host system.
Appears in 1 contract