Application Hardening Sample Clauses

Application Hardening. Supplier will comply with this Section 15.5 if Supplier is providing Accenture with access to or the use of any software, including software-as-a-service or cloud-based software. Supplier will maintain and implement secure application development policies, procedures, and standards that are aligned to Industry Standard practices (e.g., SANS Top 35 Security Development Techniques and Common Security Errors in Programming and the OWASP Top Ten project). This applies to web application, mobile application, embedded software, and firmware development. All Personnel responsible for application design, development, configuration, testing, and deployment will be qualified to perform such activities and receive appropriate training on such policies, procedures, and standards.
AutoNDA by SimpleDocs
Application Hardening i) Jamf will maintain and implement secure application development policies, procedures and standards that are aligned to Industry Standard practices such as the SANS Top 25 Security Development Techniques or the OWASP Top Ten project.
Application Hardening. From the viewpoint of WP5, in Task 5.2, we will set guidelines to improve code robustness, showcasing what is done with the CompBioMed software stack (see Appendix A of Deliverable
Application Hardening. Supplier will comply with this Section
Application Hardening. For all software running on a device, as with the device itself, the principle of least privilege (or whitelisting) should be applied. Inputs from the outside should be sanitized; especially involved databases should possess protection measures against SQL injection [41]. In addition, similar to device hardening (4.1.8), rate limiting should be imposed. This would mean to restrict the number of connections and/or queries from a single source per time.
Time is Money Join Law Insider Premium to draft better contracts faster.