Firewalls / Security Groups Clause Samples

Firewalls / Security Groups. Snowflake shall protect the Cloud Environment using industry standard firewall or security groups technology with deny-all default policies to prevent egress and ingress network traffic protocols other than those that are business-required.
Firewalls / Security Groups. Apollo shall protect the Cloud Environment using industry standard firewall or security groups technology to proactively set up egress and periodically review egress network traffic protocols for anomalies. Ingress is only allowed on those particular protocols and ports that are business-critical. Apollo reviews network security rulesets whenever a change is made by Apollo within the network, but in no event less than once each year.
Firewalls / Security Groups. Firewalls are implemented as network access control lists or security groups within the Cloud Service Provider's account. Databricks also configures local firewalls or security groups within the Customer Data Plane.
Firewalls / Security Groups. Slope shall protect the Cloud Environment using industry standard firewall or security groups technology with deny-all default policies to prevent egress and ingress network traffic protocols other than those that are business-required.
Firewalls / Security Groups eGain protects the Cloud Environment using industry standard firewall or security groups technology with deny-all default policies to prevent egress and ingress network traffic protocols other than those that are business-required. The Service is a multi-tiered zone environment, and firewalls are utilized at each tier boundary to control access from each adjacent tier including the use of Access Control Lists (ACLs). In addition, eGain uses WAF (Web Application Firewall) at cloud boundary and implements host-based firewalls on each device deployed in eGain Cloud.

Related to Firewalls / Security Groups

  • Contractor and Employee Security Precautions The security aspects of working at the Correctional Facility are critical. The following security precautions are part of the site conditions and are a part of this Contract. All persons coming on the site in any way connected with this Work shall be made aware of them, and it is the (General) Contractor’s responsibility to check and enforce them.

  • Security System The site and the Work area may be protected by limited access security systems. An initial access code number will be issued to the Contractor by the County. Thereafter, all costs for changing the access code due to changes in personnel or required substitution of contracts shall be paid by the Contractor and may be deducted from payments due or to become due to the Contractor. Furthermore, any alarms originating from the Contractor’s operations shall also be paid by the Contractor and may be deducted from payments due or to become due to the Contractor.

  • Security Safeguards Contractor shall store and process District Data in accordance with commercial best practices, including implementing appropriate administrative, physical, and technical safeguards that are no less rigorous than those outlined in SANS Top 20 Security Controls, as amended, to secure such data from unauthorized access, disclosure, alteration, and use. Contractor shall ensure that all such safeguards, including the manner in which District Data is collected, accessed, used, stored, processed, disposed of and disclosed, comply with all applicable federal and state data protection and privacy laws, regulations and directives, including without limitation C.R.S. § ▇▇-▇▇-▇▇▇ et seq., as well as the terms and conditions of this Addendum. Without limiting the foregoing, and unless expressly agreed to the contrary in writing, Contractor warrants that all electronic District Data will be encrypted in transmission and at rest in accordance with NIST Special Publication 800-57, as amended.