System and Software Protection. (i) All system and applications must utilize secure authentication and authorization mechanisms (ii) All KnowBe4-developed applications must be designed and implemented using secure coding standards and design principles (e.g., OWASP) (iii) Operating systems must be hardened appropriately according to industry standard practices (iv) Systems must be inspected for known vulnerabilities and all identified known vulnerabilities must be patched as soon as reasonably possible
Appears in 3 contracts
Sources: Master Subscription Agreement, Master Subscription Agreement, Services Agreement
System and Software Protection. (i) All system and applications must utilize secure authentication and authorization mechanisms
(ii) i. All KnowBe4-developed applications must be designed and implemented using secure coding standards and design principles (e.g., OWASP)
(iii) ii. Operating systems must be hardened appropriately according to industry standard practices
(iv) iii. Systems must be inspected for known vulnerabilities and all identified known vulnerabilities must be patched as soon as reasonably possible
Appears in 2 contracts
Sources: Terms of Service, Terms of Service
System and Software Protection. (i) i. All system and applications must utilize secure authentication and authorization mechanisms
(ii) . All KnowBe4-developed applications must be designed and implemented using secure coding standards and design principles (e.g., OWASP)
(iii) . Operating systems must be hardened appropriately according to industry standard practices
(iv) . Systems must be inspected for known vulnerabilities and all identified known vulnerabilities must be patched as soon as reasonably possible
Appears in 1 contract
Sources: Terms of Service
System and Software Protection. (i) All system and applications must utilize secure authentication and authorization mechanisms
(ii) All KnowBe4-developed applications must be designed and implemented using secure coding standards and design principles (e.g., e.g. OWASP)
(iii) Operating systems must be hardened appropriately according to industry standard practices.
(iv) Systems must be inspected for known vulnerabilities and all identified known vulnerabilities must be patched as soon as reasonably possible.
Appears in 1 contract
Sources: Terms of Service