SECURITY ARCHITECTURES. The Supplier shall apply the ‘principle of least privilege’ (the practice of limiting systems, processes and user access to the minimum possible level) to the design and configuration of IT systems which will process or store Customer Data. When designing and configuring the ICT Environment (to the extent that the ICT Environment is within the control of the Supplier) the Supplier shall follow Good Industry Practice and seek guidance from recognised security professionals with the appropriate skills and/or a CESG Certified Professional certification (▇▇▇▇://▇▇▇.▇▇▇▇.▇▇▇.▇▇/awarenesstraining/IA-certification/Pages/index.aspx) for all bespoke or complex components of the ICT Environment (to the extent that the ICT Environment is within the control of the Supplier).
Appears in 4 contracts
Sources: Lease Agreement, Lease Agreement, Lease Agreement
SECURITY ARCHITECTURES. The Supplier shall apply the ‘principle of least privilege’ (the practice of limiting systems, processes and user access to the minimum possible level) to the design and configuration of IT systems which will process or store Customer Data. When designing and configuring the ICT Environment (to the extent that the ICT Environment is within the control of the Supplier) the Supplier shall follow Good Industry Practice and seek guidance from recognised security professionals with the appropriate skills and/or a CESG Certified Professional certification (▇▇▇▇://▇▇▇.▇▇▇▇.▇▇▇.▇▇/awarenesstraining/IA-certification/Pages/index.aspxindex.aspx ) for all bespoke or complex components of the ICT Environment (to the extent that the ICT Environment is within the control of the Supplier).
Appears in 2 contracts
Sources: Call Off Contract, Call Off Contract