Common use of Secure Hosting Clause in Contracts

Secure Hosting. We utilize an Infrastructure as Code (IaC) proces. This gives us a good overview on our cluster and security rules. In this container-based architecture we have rules in place for firewalls, patch/package management, vulnerability scans, health monitoring and alerting, and so on. Firewalls (with a deny-by-default posture) protect the internal network zones and the network as a whole.

Appears in 2 contracts

Samples: Foleon Processor Agreement, Foleon Processor Agreement

AutoNDA by SimpleDocs

Secure Hosting. We utilize an Infrastructure as Code (IaC) procesprocess. This gives us a good overview on our cluster and security rules. In this container-based architecture we have rules in place for firewalls, patch/package management, vulnerability scans, health monitoring and alerting, and so on. Firewalls (with a deny-by-default posture) protect the internal network zones and the network as a whole.

Appears in 2 contracts

Samples: Processing Agreement, Processing Agreement

AutoNDA by SimpleDocs
Time is Money Join Law Insider Premium to draft better contracts faster.