Common use of Infrastructure and Virtualization Security Clause in Contracts

Infrastructure and Virtualization Security. Controls defending against cyberattacks, including the principle of least privilege, baseline management, intrusion detection, host/network-based firewalls, segmentation, isolation, perimeter security, access management, detailed data flow information, network, time, and a SIEM solution must be implemented.

Appears in 11 contracts

Sources: Call Off Contract, Master Subscription Agreement, Data Processing Agreement

Infrastructure and Virtualization Security. Controls defending against cyberattacks, including the principle of least privilege, baseline management, intrusion detection, host/host/ network-based firewalls, segmentation, isolation, perimeter security, access management, detailed data flow information, network, time, and a SIEM solution must be implemented.

Appears in 1 contract

Sources: Data Processing Addendum