Examples of ICT Environment in a sentence
Applying the ‘principle of least privilege’, users and administrators shall be allowed access only to those parts of the ICT Environment that they require.
The Supplier and the Buyer shall work together to establish any additional audit and monitoring requirements for the ICT Environment.
In order to facilitate effective monitoring and forensic readiness such Supplier audit records should (as a minimum) include: Logs to facilitate the identification of the specific asset which makes every outbound request external to the ICT Environment (to the extent that the ICT Environment is within the control of the Supplier).
The Buyer and the Supplier acknowledge that from time to time vulnerabilities in the ICT Environment will be discovered which unless mitigated will present an unacceptable risk to the Buyer’s information.
Security events generated in the ICT Environment (to the extent that the ICT Environment is within the control of the Supplier) and shall include: privileged account log-on and log-off events, the start and termination of remote access sessions, security alerts from desktops and server operating systems and security alerts from third party security software.