Network Controls Sample Clauses
The Network Controls clause establishes requirements for the implementation and maintenance of security measures to protect a network and its data. Typically, this clause mandates the use of firewalls, intrusion detection systems, access controls, and regular monitoring to prevent unauthorized access or data breaches. Its core function is to ensure that robust safeguards are in place to mitigate cybersecurity risks and protect sensitive information from external and internal threats.
Network Controls. Contractor shall have, shall implement, and shall maintain network security controls, including the use of firewalls, layered DMZs and updated intrusion detection and prevention systems, reasonably designed to protect systems from intrusion or limit the scope or success of any attack or attempt at unauthorized access to City Data.
Network Controls. Genesys will employ effective network security controls based on industry standards to ensure that Customer Data is segmented and isolated from other customer environments within the Data Center. Controls include, but are not limited to:
A) Segregated Firewall Services. Customer environments are segmented using physical and contextual firewall instances.
Network Controls. Supplier shall manage and control networks in order to protect UL Solutions from threats and to maintain security for the network, including information in transit. Supplier shall implement controls to ensure the security of information in networks and the protection of connected services from unauthorized access. Controls shall be implemented to ensure the availability of network services and information services using the network. Responsibilities and procedures shall be established for the management of equipment on the network, including equipment in user areas.
Network Controls. Data importer will secure all data and communications networks to ensure the protection of Personal Data.
Network Controls. August Schools manages, controls, and secures its networks, the connected systems, applications, and data-in-transit to safeguard against internal and external threats. August Schools must utilize network firewalls, web application firewalls, and/or equivalent mechanisms to safeguard applicable internet connections, internal network zones, and applications from threats. August Schools configures appropriate firewall alerts and alarms for timely response and investigation. This also applies to applicable wireless networks. August Schools ensures networking ports and protocols are restricted based on the principle of least functionality. Ports and network routes should only be open when there is proper business justification. Firewall configurations and rulesets are maintained. Firewall rules are implemented to minimize exposure to external threats. Significant changes to network services and configurations should be tracked in accordance with the Change Management Policy. As an additional layer of defense, August Schools utilizes monitoring solutions to detect and alert on network-based intrusions and/or threats. maintains network and data flow diagrams. Diagrams are reviewed and updated when significant network infrastructure changes occur. In addition to the Network Security Policy, August Schools establishes, documents, and reviews the Access Control and Termination Policy based on business and security requirements. This policy also encompasses network access control. August Schools segregates networks based on the required groups of information services, users, and systems. August Schools utilizes firewall configurations to restrict connections between untrusted networks and trusted networks. Additionally, August Schools may utilize security groups and network access control lists (NACLs) to improve network security for individual virtual machines.
Network Controls. Jostens ensures that all data and communications networks are secured to ensures the transmission of data is kept confidential.
a. Applications, ports, services, and similar access points installed on a computer or network facility, which are not specifically required for business functionality, are disabled or removed;
b. Network segments connected to the Internet are protected by a firewall which is configured to secure all devices behind it;
c. Network segments where Jostens data resides are isolated from non-Jostens data, logically or physically unless approved by Jostens Security;
d. User connection capability are documented with regard to messaging, electronic mail, file transfer, interactive access, and application access;
e. All production servers are located in a secure, access-controlled location;
f. Firewalls are configured properly to address all reasonably-known security concerns;
g. Infrastructure diagrams, documentation, and configurations are up to date, controlled and available to assist in issue resolution; and
h. Systems must have the ability to detect a potential hostile attack. (e.g., IDS/IPS)
i. All systems are updated to the current release and actively monitored.
Network Controls. Networks are managed and controlled to protect information in systems and applications.
Network Controls. A current telecommunication network diagram shall be maintained. The telecommunication network diagram shall document all internal and external connections to TSM systems storing, processing or transmitting information (e.g., PII, ePHI). The diagram shall also include authorized wireless networks and Wireless Access Points (WAP). [Core-15(b)] The telecommunications network diagram shall be reviewed and updated based on the changes in the environment and no less than every 6 months. [Core-15(b)] TSM management shall implement telecommunications network controls to ensure the security of the IT assets and the protection of connected systems and active services from Policy No.: ISP#13 Page 63 Effective Date: 09/01/2016 Approval Date: 09/01/2016 Department: Information Security Last Review Date: 08/11/2016 Policy Name: Network Security unauthorized access as well as to ensure the availability of the required telecommunication network services in order to support the organization Business Continuity and Disaster Recovery strategy. [Core-15(b)]
Network Controls i) Vendor shall implement appropriate controls to ensure that only authorized devices are provisioned network access when physically connected to the network.
ii) As necessary, Vendor shall provision logically or physically segregated network to allow guest access for visitors to their facilities. In no case shall Vendor allow guests, or other non-Vendor managed and controlled personnel, access to production networks.
iii) Vendor shall implement technical controls to filter inappropriate and unnecessary web content including, but not limited to, pornography, gambling, violence, webmail, social media, etc.
iv) All Vendor controlled wireless connections shall be secured utilizing Wi-Fi Protected Access 2 (“WPA2”) or better security protocol.
v) Vendor shall ensure that interconnections within Vendor, with other companies, and with the Internet (“Access Points”), whether wired or wireless, into the Vendor network are protected by using firewalls, secure tunnels, and/or access lists on routers.
vi) Vendor shall ensure that a network management system is used to monitor its local network and servers. Thresholds and alarms shall be established to notify Vendor of potential problems or outages.
vii) Vendor shall implement either host-based or network-based Intrusion Detection Solution (“IDS”) or Intrusion Protection Solution (“IPS”) on any Vendor controlled network used to process, store, transmit, or access Customer Confidential Information. Appropriate response and recovery plans to monitor potential unauthorized access to said network and systems shall be implemented.
viii) Vendor shall implement a Data Loss Prevention system (“DLP”) to prevent the accidental or intentional distribution of Customer Confidential Information.
ix) Vendor shall secure all unused network ports.
