System and Software Protection. 1. Utilize secure authentication and authorization mechanisms for all systems and applications. 2. Use secure coding standards and design principals (e.g., OWASP) for developed applications. 3. ▇▇▇▇▇▇ operating systems appropriately according to industry best practices (e.g. NIST 800 series, NSA guidelines, CIS benchmark, etc.).
Appears in 2 contracts
Sources: Security Terms, Security Terms