The company restricts privileged access to encryption keys to authorized users with a business need.The company requires authentication to production datastores to use authorized secure authentication mechanisms, such as unique SSH key.
The company restricts privileged access to encryption keys to authorized users with a business need.
The company requires authentication to systems and applications to use unique username and password or authorized Secure Socket Shell (SSH) keys.
System access restricted to authorized access only
The company's access control policy documents the requirements for the following access control functions:
The company restricts privileged access to databases to authorized users with a business need.
The company restricts privileged access to the operating system to authorized users with a business need.
The company restricts privileged access to the production network to authorized users with a business need.
The company completes termination checklists to ensure that access is revoked for terminated employees within SLAs.
The company requires authentication to the "production network" to use unique usernames and passwords or authorized Secure Socket Shell (SSH) keys.
The company's production systems can only be remotely accessed by authorized employees possessing a valid multi-factor authentication (MFA) method.
The company uses an intrusion detection system to provide continuous monitoring of the company's network and early detection of potential security breaches.
The company completes termination checklists to ensure that access is revoked for terminated employees within SLAs.
The company restricts privileged access to encryption keys to authorized users with a business need.
The company requires authentication to systems and applications to use unique username and password or authorized Secure Socket Shell (SSH) keys.
System access restricted to authorized access only
The company's access control policy documents the requirements for the following access control functions:
The company completes termination checklists to ensure that access is revoked for terminated employees within SLAs.
The company requires authentication to the "production network" to use unique usernames and passwords or authorized Secure Socket Shell (SSH) keys.
The company restricts privileged access to encryption keys to authorized users with a business need.
The company requires authentication to systems and applications to use unique username and password or authorized Secure Socket Shell (SSH) keys.
System access restricted to authorized access only
The company's access control policy documents the requirements for the following access control functions:
The company completes termination checklists to ensure that access is revoked for terminated employees within SLAs.
The company requires authentication to the "production network" to use unique usernames and passwords or authorized Secure Socket Shell (SSH) keys.
The company restricts privileged access to encryption keys to authorized users with a business need.
The company requires authentication to systems and applications to use unique username and password or authorized Secure Socket Shell (SSH) keys.
System access restricted to authorized access only
The company's access control policy documents the requirements for the following access control functions:
The company completes termination checklists to ensure that access is revoked for terminated employees within SLAs.
The company requires authentication to the "production network" to use unique usernames and passwords or authorized Secure Socket Shell (SSH) keys.
The company restricts privileged access to encryption keys to authorized users with a business need.
The company requires authentication to systems and applications to use unique username and password or authorized Secure Socket Shell (SSH) keys.
System access restricted to authorized access only
The company's access control policy documents the requirements for the following access control functions:
The company completes termination checklists to ensure that access is revoked for terminated employees within SLAs.
The company requires authentication to the "production network" to use unique usernames and passwords or authorized Secure Socket Shell (SSH) keys.