Build and Maintain a Secure Network Sample Clauses
The "Build and Maintain a Secure Network" clause requires parties to establish and continuously uphold robust security measures for their network infrastructure. This typically involves implementing firewalls, regularly updating security protocols, and monitoring network traffic to prevent unauthorized access or data breaches. By mandating these practices, the clause helps protect sensitive information, reduce the risk of cyberattacks, and ensure ongoing compliance with security standards.
Build and Maintain a Secure Network. 5.1 Protect Internet connections with dedicated, industry-recognized Firewalls that are configured and managed using industry best security practices.
5.2 Internal private Internet Protocol (IP) addresses must not be publicly accessible or natively routed to the Internet. Network address translation (NAT) technology should be used.
5.3 Administrative access to Firewalls and servers must be performed through a secure internal wired connection only.
5.4 Any stand alone computers that directly access the Internet must have a desktop Firewall deployed that is installed and configured to block unnecessary/unused ports, services and network traffic.
5.5 Encrypt Wireless access points with a minimum of WEP 128 bit encryption, WPA encryption where available.
5.6 Disable vendor default passwords, SSIDs and IP Addresses on Wireless access points and restrict authentication on the configuration of the access point.
Build and Maintain a Secure Network. Protect Internet connections with dedicated, industry-recognized firewalls that are configured and managed using industry standard security practices. • Internal private internet protocol (IP) addresses must not be publicly accessible or natively routed to the Internet. Network address translation (NAT) technology should be used. • Any stand-alone computers that directly access the Internet must have a desktop firewall deployed that is installed and configured to block unnecessary/unused ports, services and network traffic. • Encrypt wireless access points with a minimum of Wi-Fi protected access (WPA) encryption security standard. • Disable end-user default passwords, SSIDs and IP addresses on wireless access points and restrict authentication on the configuration of the access point.
Build and Maintain a Secure Network. 5.1 Protect Internet connections with dedicated, industry-recognized firewalls that are configured and managed using industry best security practices.
5.2 Internal private Internet Protocol (IP) addresses must not be publicly accessible or natively routed to the Internet. Network address translation (NAT) technology should be used.
5.3 Administrative access to firewalls and servers must be performed through a secure internal wired connection only.
5.4 Any stand-alone computers that directly access the Internet must have a desktop firewall deployed that is installed and configured to block unnecessary/unused ports, services, and network traffic.
5.5 Change vendor defaults including but not limited to passwords, encryption keys, SNMP strings, and any other vendor defaults.
5.6 For wireless networks connected to or used for accessing or transmission of Experian data, ensure that networks are configured and firmware on wireless devices updated to support strong encryption (for example, IEEE 802.11i) for authentication and transmission over wireless networks.
5.7 When using service providers (e.g. software providers) to access ACRAnet systems, access to third party tools/services must require multi-factor authentication.
Build and Maintain a Secure Network. 1. Install and maintain a firewall configuration to protect cardholder data
2. Do not use vendor-supplied defaults for system passwords and other security parameters
Build and Maintain a Secure Network. 5.1 Protect Internet connections with dedicated, industry-recognized firewalls that are configured and managed using industry best security practices.
5.2 Internal private Internet Protocol (IP) addresses must not be publicly accessible or natively routed to the Internet. Network address translation (NAT) technology should be used.
5.3 Administrative access to firewalls and servers must be performed through a secure internal wired connection only.
5.4 Any stand-alone computers that directly access the Internet must have a desktop firewall deployed that is installed and configured to block unnecessary/unused ports, services, and network traffic.
5.5 Change vendor defaults including but not limited to passwords, encryption keys, SNMP strings, and any other vendor defaults.
5.6 For wireless networks connected to or used for accessing or transmission of RPS data, ensure that networks are configured and firmware on wireless devices updated to support strong encryption (for example, IEEE 802.11i) for authentication and transmission over wireless networks.
5.7 When using service providers (e.g. software providers) to access RPS systems, access to third party tools/services must require multi-factor authentication.
Build and Maintain a Secure Network. CLIENT understands and agrees that they must build and maintain a secure network. These measures include: ● Protecting Internet connections with dedicated, industryrecognized firewalls that are configured and managed using industry best security practices. ● Internal private Internet Protocol (IP) addresses must not be publicly accessible or natively routed to the Internet. Network address translation (NAT) technology should be used. ● Administrative access to firewalls and servers must be performed through a secure internal wired connection only. ● Any standalone computers that directly access the Internet must have a desktop firewall deployed that is installed and configured to block unnecessary/unused ports, services, and network traffic. ● Encrypt wireless access points with a minimum of WEP 128 bit encryption, WPA encryption where available. ● Disable vendor default passwords, SSIDs and IP addresses on wireless access points and restrict authentication on the configuration of the access point.
Build and Maintain a Secure Network. Protect Internet connections with dedicated, industry-recognized Firewalls that are configured and managed using industry best security practices. Internal private Internet Protocol (IP) addresses must not be publicly accessible or natively routed to the Internet. Network address translation (NAT) technology should be used. Administrative access to Firewalls and servers must be performed through a secure internal wired connection only. Any Stand alone computers that directly access the Internet must have a desktop Firewall deployed that is installed and configured to block unnecessary/unused ports, services, and network traffic. Encrypt Wireless access points with a minimum of WEP 128 bit encryption, WPA encryption where available. Disable vendor default passwords, SSIDs and IO Addresses on Wireless access points and restrict authentication on the configuration of the access point.
Build and Maintain a Secure Network. (A) Protect Internet connections with dedicated, industry-recognized firewalls that are configured and managed using industry best security practices.
(B) Internal private Internet Protocol (IP) addresses must not be publicly accessible or natively routed to the Internet. Network address translation (NAT) technology should be us e d .
(C) Administrative access to firewalls and servers must be performed through a secure internal wired connection only.
(D) Any standalone computers that directly access the Internet must have a desktop firewall deployed that is installed and configured to block unnecessary/unused ports, services, and network traffic.
(E) Encrypt wireless access points with a minimum of WEP 128-bit encryption, WPA encryption where available.
(F) Disable vendor default passwords, SSIDs and IP Addresses on wireless access points and restrict authentication on the configuration of the access point.
