Common use of Secure Hosting Clause in Contracts

Secure Hosting. We utilize an Infrastructure as Code (IaC) process. This gives us a good overview on our cluster and security rules. In this container-based architecture we have rules in place for firewalls, patch/package management, vulnerability scans, health monitoring and alerting, and so on.

Appears in 4 contracts

Sources: Data Processing Agreement, Data Processing Agreement, Data Processing Agreement

Secure Hosting. We utilize an Infrastructure as Code (IaC) processproces. This gives us a good overview on our cluster and security rules. In this container-based architecture we have rules in place for firewalls, patch/package management, vulnerability scans, health monitoring and alerting, and so on.

Appears in 2 contracts

Sources: Processor Agreement, Processor Agreement