Service Integrity & Availability. Modifications to operating system resources and application software are governed by IBM’s change management process. Changes to firewall rules are also governed by the change management process and are separately reviewed by the IBM security staff before implementation. IBM systematically monitors the data center resources 24x7. Internal and external vulnerability scanning is regularly conducted by authorized administrators to help detect and resolve potential system security exposures. Anti-virus detectionsystems are in place throughout all IBM data centers. IBM’s data center services support a variety of information delivery protocols for transmission of data over public networks. Examples include HTTPS/SFTP/FTPS. Backup data intended for off-site storage is encrypted prior to transport.
Appears in 1 contract
Sources: Cloud Services Agreement
Service Integrity & Availability. Modifications to operating system resources and application software are governed by IBM’s change management process. Changes to firewall rules are also governed by the change management process and are separately reviewed by the IBM security staff before implementation. IBM systematically monitors the data center resources 24x7. Internal and external vulnerability scanning is regularly conducted by authorized administrators to help detect and resolve potential system security exposures. Anti-virus detectionsystems detection systems are in place throughout all IBM data centers. IBM’s data center services support a variety of information delivery protocols for transmission of data over public networks. Examples include HTTPS/SFTP/FTPS. Backup data intended for off-site storage is encrypted prior to transport.
Appears in 1 contract
Sources: Ibm Cloud Services Agreement