Logical Security Sample Clauses

POPULAR SAMPLE Copied 1 times
Logical Security. The Application and the data it supports are protected by a redundant set of firewalls, which cover all access points from the connected public networks. Internet security policies are in place to enforce maintenance plans and regular security reviews.
Logical Security. The Vendor shall notify TSP immediately if any Contract Personnel no longer require Access or change role for any reason whatsoever thus enabling TSP to disable or modify the Access rights. The Vendor shall maintain systems which detect and record any attempted damage, amendment or unauthorised access to TSP Information. The Vendor shall, implement agreed as well as generally prevalent security measures across all supplied components and materials including software & Data to ensure safeguard and confidentiality, availability and integrity of TSP Systems and TSP Information. The Vendor shall provide TSP with full documentation in relation to the implementation of logical security in relation to Purpose and shall ensure that it and such security: prevents unauthorised individuals e.g. hackers from gaining Access to TSP Systems; and reduces the risk of misuse of TSP Systems or TSP information, which could potentially cause loss of revenue or service (and its Quality) or reputation, breach of security by those individuals who are Authorised to Access it; and detects any security breaches that do occur enabling quick rectification of any problems that result and identification of the individuals who obtained Access and determination of how they obtained it.
Logical Security. All hard drives of TEHTRIS Appliances at the Customer's premises or in the TEHTRIS datacenter (which are used in servers) are encrypted via FDE (Full Disk Encryption) with keys that are stored off-site in a restricted, protected and encrypted area. All hard drives on TEHTRIS workstations (which are used to remotely administer the TEHTRIS Service) are encrypted via FDE. Workstations with elevated privileges are physically protected and inaccessible outside of business hours. All system authentications are performed by using a crypto-processor in a French branded smart card, with a PIN code typed on an external French branded reader, and/or by an ANSSI certified external key. All operating systems used in TEHTRIS Appliances at the Customer site or in the TEHTRIS datacenter are protected by secure Linux kernels, modified and compiled by TEHTRIS, with the use of advanced security technologies, including for example: RBAC integration in the kernel with role assignment and security policies for all processes; technologies against overflow attacks; special protections against data leakage into memory Applications hosted in TEHTRIS Appliances at the Customer's premises or in the TEHTRIS datacenter, built by TEHTRIS in order to provide the TEHTRIS Service, may use technologies such as obfuscation, encryption and anti-reverse engineering, in order to limit and slow down attempts to recover functionality. All communications related to the TEHTRIS Service are encrypted between TEHTRIS workstations and the TEHTRIS datacenter. All communications between TEHTRIS Appliances are encrypted including in the TEHTRIS datacenter. All communications between TEHTRIS employees regarding the Agreement are encrypted (email, instant messaging). TEHTRIS' internal network access security contains scalable modules to combat physical and logical intrusion threats, for example: authentication on the network with 802.1X; technologies against network attacks, such as DHCP attacks, ARP spoofing attacks, IP spoofing attacks, etc.; partitioning of activities with network zoning to separate Users and respect watertightness notions; presence of two separate firewalls between the Internet network and the Internet operator's network; TEHTRIS' employees can access the network through the Internet. TEHTRIS employees have no incoming access to the TEHTRIS internal network from a distance, as the latter behaves like a diode with respect to the Internet. Access to the TEHTRIS datacenter infrastructure ...
Logical Security. Elecosoft data centre providers apply anti-virus, anti-malware, anti-phishing, and anti-ransomware protection by enforcing real-time scanning, enhanced rootkit detection, PUA detection, core system protection, malicious website, identity protection and local firewall protection. This is further complemented by the following security methods, as a minimum:
Logical Security. Supplier shall follow industry best practices and take the additional precautions below with respect to the logical security of Secure Information in its possession. i. As applicable, Supplier shall ensure any Information Technology System automatically locks or logs out when left unattended. ii. Information Technology Systems shall be segregated as necessary and protected by a physical firewall with all ports blocked except those needed for specific Supplier applications, and Supplier shall take such other measures as are reasonable in light of the Secure Information to which it has access. Such additional measures may include, and Syntax, in its sole discretion, may require: virus and malware scanning, intrusion detection and prevention technologies, managed secure patching practices, third party vulnerability testing, and virtual private networking or multi-factor authentication schemes. iii. Information Technology Systems must be protected by and may only be accessed using Strong Authentication systems. iv. Supplier shall encrypt Secure Information stored on any Information Technology System using Strong Encryption methods. If Supplier transfers any Secure Information via the internet or any untrusted network, it shall encrypt the Secure Information using Strong Encryption methods while in transit. v. Supplier shall use cryptographic and hashing algorithm types, strength, and key management processes consistent with industry best practices. vi. Supplier shall centrally manage access to any Information Technology System and implement an appropriate set of procedures for authorizing logical access to Secure Information that ensures access is appropriate according to the business function of Supplier personnel. vii. As applicable, access to Information Technology Systems must be monitored, recorded, and controlled to a reasonable standard.
Logical Security. Twilio has a dedicated team to ensure they’re on the forefront of compliance and delivery. If the company sees accounts with signs of suspicious activity, it takes immediate action. Operational Security.Access to Twilios' systems and data is restricted only to those who need access in order to provide support. Personal security. Twilio also have industry leading personnel management, including: :
Logical Security. To achieve logical security, it may be necessary to engage an outside network consultant to configure network and workstation security.
Logical Security. Krayma shall define, document, and implement procedures for logical access control (identity and access management). These procedures shall be implemented, enforced, monitored, and periodically reviewed. The procedures shall also include controls for monitoring anomalies. These procedures shall, at a minimum, implement the following elements, where the term ‘user’ also includes technical users: a) Need to know, least privilege and segregation of duties: Krayma shall manage access rights to information assets and its supporting systems on a ‘need-to-know’ basis, including for remote access. Users shall be granted minimum access rights that are strictly required to execute its duties (principle of ‘least privilege’), i.e. to prevent unjustified access to a large set of data or to prevent the allocation of combinations of access rights that may be used to circumvent controls (principle of ‘segregation of duties’). b) User accountability: Krayma shall limit, as much as possible, the use of generic and shared user accounts and ensure that users can be identified for the actions performed in the ICT systems. This goes against Microsoft best practice, which limits Global Admin to 5 max.
Logical Security a. Visier limits access to Customer Data to personnel who need to know such information and who have met the enhanced background check requirements. b. Visier has implemented technical and organizational identity and access controls to minimize the potential of unauthorized access to Customer Data, including, without limitation, the following: i. formal procedures and processes for requesting, granting, revoking, reviewing, and auditing access profiles used by personnel provide the Services; ii. unique identification of the user or service account accessing the systems; iii. prohibition of the use of shared accounts; iv. restricted allocation of privileged and administrator access at the application, database, operating system, and network components in line with segregation of duties; v. use of individual user ID and passwords in-line with internal policies that consider minimum length, complexity, history, and lockout functionality; and vi. use of strong authentication protocols such as single-sign on (SSO) with at least two factor authentication (2FA) for all authorized personnel including any remote access to Visier systems and Customer environments. c. Visier’s Customers have a choice in using SSO or 2FA authentication methods. Any Customers not using SSO will automatically have 2FA enabled, unless explicitly requested by you in writing to disable 2FA. d. Visier has implemented periodic access reviews of all personnel authorized with access to Customer Data to ensure user access is commensurate with their roles and responsibilities. e. Visier has implemented measures to logically separate its Customer’s Data from the data of other customers through use of technical controls. f. Visier has implemented measures to restrict access to its Customer Data through role-based access across its products. g. Visier has implemented measures to identify and detect any logins or access provisions for administrator access using automated alerts.
Logical Security. The Contractor shall establish, using National Institute Standards and Technology (NIST) Special Publications as a guide, secure logical and physical infrastructures for Information Systems (IS) environments including, but not limited to, security plans, risk assessments, access controls, directory services, compliance monitoring, firewalls, intrusion detection/scanning systems, anti-virus tools, privacy data assessment, and PII and other data protection policies. This function includes providing details for security awareness training, personnel security, policy enforcement, incident handling procedures, and separation of duties within an organization. In addition, the Contractor shall recommend and implement current best practices for the widest range of operating systems, database, networks, and application security, taking current best practices, industry standards, and Government regulations and policies into account.