Common use of DMZ Clause in Contracts

DMZ. A special segment of the local network reserved for servers that are accessible from the Internet. Internal here are servers and devices that are not allowed direct Internet access and are unavailable to Internet clients. Airport PROXY Add reverse proxies to their functionality and connections. Both environments will be protected by firewall gateways, and by default they cannot communicate with the Internet or to other DMZs or internal networks. Devices located in DMZs are not allowed to start communication with devices located within the internal environment. If it is necessary to publish some data on servers in the DMZ environment, it is necessary to upload it from the internal environment so that the transfer is started by the servers in the internal environment. Requirements for exemption from this rule are subject to the prior approval of M/SDS and Ř /IBE, or ED/ICT. If DMZ servers are in a multi-tier architecture, all slave servers (application or database) must also be in the DMZ environment. This point respects the requirement regarding the prohibited establishment of communication from the DMZ to the internal environment. Users may only connect approval terminal devices to the data network and only in places designated for them. It is strictly forbidden to connect devices such as routers, switches or wireless access points. Requirements for exemption from this rule are subject to the prior approval of M/SDS and Ř /IBE, or ED/ICT. The area itself is a cloud environment which, from a network point of view, is considered external and cloud services are only integrated with on-premise. In this architecture, the cloud is considered a priori and less trustworthy and similar principles are applied to it as to DMZ. Hardening will be applied to terminal devices.

Appears in 1 contract

Sources: Service Provision Contract

DMZ. A special segment of the local network reserved for servers that are accessible from the Internet. Internal here are servers and devices that are not allowed direct Internet access and are unavailable to Internet clients. Airport PROXY Add reverse proxies to their functionality and connections. Both environments will be protected by firewall gateways, and by default they cannot communicate with the Internet or to other DMZs or internal networks. Devices located in DMZs are not allowed to start communication with devices located within the internal environment. If it is necessary to publish some data on servers in the DMZ environment, it is necessary to upload it from the internal environment so that the transfer is started by the servers in the internal environment. Requirements for exemption from this rule are subject to the prior approval of M/SDS and Ř /IBEŘ/IBE, or ED/ICT. If DMZ servers are in a multi-tier architecture, all slave servers (application or database) must also be in the DMZ environment. This point respects the requirement regarding the prohibited establishment of communication from the DMZ to the internal environment. Users may only connect approval terminal devices to the data network and only in places designated for them. It is strictly forbidden to connect devices such as routers, switches or wireless access points. Requirements for exemption from this rule are subject to the prior approval of M/SDS and Ř /IBEŘ/IBE, or ED/ICT. The area itself is a cloud environment which, from a network point of view, is considered external and cloud services are only integrated with on-premise. In this architecture, the cloud is considered a priori and less trustworthy and similar principles are applied to it as to DMZ. Hardening will be applied to terminal devices.

Appears in 1 contract

Sources: Contract for Work