Infrastructure Security Sample Clauses

Infrastructure Security. The 4me Infrastructure will be electronically accessible to 4me staff, contractors and any other person as necessary to provide the Services. 4me will maintain access controls and policies to manage what access is allowed to the 4me Infrastructure from each network connection and user, including the use of firewalls or functionally equivalent technology and authentication controls. 4me will maintain corrective action and incident response plans to respond to potential security threats.
AutoNDA by SimpleDocs
Infrastructure Security. Processor personnel are required to follow security policies that define access privileges and control for the transmission, processing, and storing of sensitive data. Processor conducts annual risk assessments on system and networking components which include systems, data, computers, personal devices, applications, facilities, connections, individuals, documentation, and electronic media, where confidential, sensitive data is present. Personnel are required to execute an Information Security policy and must acknowledge receipt of, and compliance with, Processor’s security policies.
Infrastructure Security. 5.4.1 The Service Provider shall comply with the provisions of schedule 6
Infrastructure Security. 6.1 The Service Provider shall ensure that all networks used by the Service Provider in the provision of the service are secure and protected from unauthorised access.
Infrastructure Security. Supplier uses G Suite and Google Cloud Platform (GCP) to host the Supplier’s Systems. All of the Supplier’s Systems are fully managed by Google Inc. (Google), who is responsible for the physical and networking security of the Supplier’s Systems. Google’s security measures regarding the G Suite and GCP infrastructures are described on this page (G Suite) xxxxx://xxxxxx.xxxxxx.xxx/security/?secure-by-design_activeEl=data-centers and this page (Google Cloud Platform): xxxxx://xxxxx.xxxxxx.xxx/security/
Infrastructure Security. Interconnection Customer shall comply with the requirements for infrastructure and operational security of the S-Line Upgrade Project implemented pursuant to the CAISO Tariff, including the CAISO’s standards for information security posted on the CAISO’s internet web site at the following internet address: xxxxx://xxx.xxxxx.xxx/pubinfo/info- security/index.html and Applicable Reliability Standards.
Infrastructure Security. The web servers as entry points for the entire system are completely independent systems to the database server. They run on the latest stable Debian version, access is only possible through SSH via key authentication. For the CCH, we use an NGINX, configured as a reverse proxy, listening on port 3000 (SSL on). The NGINX proxies all connect to a "Thin Webserver" which is used as an API server. It is not reachable from the Internet itself, because it did not bind any TCP sockets by itself. All other servers (Database and Filestore- Server) are in a virtual network. They are only accessible through the API-providing web server, with a valid API key, and for system administration purpose through SSH via key authentication only. As we are running two different database models (REDIS in combination with a XXXXXXXXX cluster) we have two different data backup strategies. As the REDIS database is only used for real-time time data, real-time analytics and real-time communication, and only keeps rapidly changing data with a foreseeable database size, we don’t backup the data here. To store data via a longer timeframe and to archive data, we use a Xxxxxxxxx Cluster with several nodes. The big advantage of Xxxxxxxxx is that is brings its own backup utilities and restore process. The server nodes are spread over multiple data centres and sites and the data is replicated between these nodes. Data restoration and recovery is usually needed only in cases where all replications of a data set are lost, or corrupted data is written to the database. For this worst-case scenario, we backup one node additionally via Bacula [1] on a separate node. All servers of the central infrastructure are operated by ECO / DE-CIX and are running in a secured and ISO-27001-certified Data-Centre. The data centre has an electronic access control system, with a 24/7 camera monitoring of entrances and server rooms secure the servers against unauthorized physical access. Remote access is only possible via a SSH with Key Authentication and a VPN-connection only, which is even limited to a very few system administrators, with user rights and the possibility to get "root"-access via "sudo". The default root login is disabled by default. The following are the characteristics of the CCH servers and the security mechanisms put in place: API Server xxxxxxxxx.000.xxx.xxxxxxxxxxxxxxxx.xxx Open Ports HTTPS via port 3000 and 8080 Security mechanisms There is no FTP and no direct SSH access to this server. Ac...
AutoNDA by SimpleDocs
Infrastructure Security. Xxxxx has implemented the following security mechanisms:
Infrastructure Security. ● Datadog maintains system clock synchronization across all applicable systems in relation to the Services. ● Datadog maintains an environment for testing and development separate from the production environment. SCHEDULE B – CONTROLLER TO PROCESSOR STANDARD CONTRACTUAL CLAUSES SECTION I Clause 1 Purpose and scope
Infrastructure Security. ● Datadog maintains system clock synchronization across all applicable systems in relation to the Services. DATADOG MAINTAINS AN ENVIRONMENT FOR TESTING AND DEVELOPMENT SEPARATE FROM THE PRODUCTION ENVIRONMENT. ANNEX III LIST OF SUB-PROCESSORS The controller has authorised the use of the following sub-processors: Service Providers Name Address Description of processing Amazon Web Services, Inc. 000 Xxxxx Xxxxxx North Seattle, WA 98109 United States Datadog customers can deploy solutions on an AWS cloud computing environment that provides compute, power, storage, and other application services over the Internet as their business needs demand. Atlassian Pty Ltd (Jira) 000 Xxxx Xxxxxx, Floor 13 San Francisco, CA 94104 United States Datadog uses Jira issue-tracking software to manage support requests from customers. Google LLC (G Suite) 0000 Xxxxxxxxxxxx Xxxx Xxxxxxxx Xxxx, XX 00000 Xxxxxx Xxxxxx Datadog uses this office suite to (1) communicate with customers in some cases, and (2) manage and organize customer requests. Google LLC (Google Cloud Platform) 0000 Xxxxxxxxxxxx Xxxx Xxxxxxxx Xxxx, XX 00000 Xxxxxx Xxxxxx Datadog customers can deploy solutions on a GCP cloud- computing environment that provides compute, power, storage, and other application services over the Internet as their business needs demand. Mailgun Technologies, Inc. 000 X Xxxxx Xx #0000 Xxx Xxxxxxx, XX 00000 Xxxxxx Xxxxxx Datadog uses this (1) as a backup email relay to send emails to Datadog customers or customer’s users as part of the Datadog services (including, for example, monitor alerts, reports, and account modification), and (2) to receive emails from services or people (e.g., emails from xxxx@xxxxxxxxx.xxx).
Time is Money Join Law Insider Premium to draft better contracts faster.