Secure Infrastructure. CDW maintains a secure infrastructure topology that meets industry standards for: • segmentation, ensuring Personal Information is logically separated from CDW data and that of other CDW customers, • firewall and network architecture, including considerations for internal and external communications, • intrusion detection and prevention, • encryption for data at rest and in motion, • device hardening and standard configuration, including the removal of system defaults and unused ports and services, • malware detection and prevention designed to protect CDW systems, including those that store Personal Information or connect to customer environments, and • Security Event and Incident Monitoring, including alerting, response, remediation, and log protection and retention procedures.
Appears in 1 contract
Sources: Data Processing Agreement
Secure Infrastructure. CDW maintains a secure infrastructure topology that meets industry standards for: • segmentation, ensuring Personal Information Da ta is logically logica lly separated from CDW data and that of other CDW customers, • firewall firewa ll and network architecture, including considerations for internal and external communications, • intrusion detection and prevention, • encryption for data at rest and in motion, • device hardening and standard configuration, including the removal of system defaults and unused ports and services, • malware detection and prevention designed to protect CDW systems, including those that store Personal Information Data or connect to customer environments, and • Security Event and Incident Monitoring, including alerting, response, remediation, and log protection and retention procedures.
Appears in 1 contract
Sources: Data Processing Agreement