You should have an automated way to manage and analyze security control flows and processes like reporting events that violate security policies or customer licensing agreements to support security compliance audits. 您应当有一个自动方式来管理和分析安全控制流和进程如同违反安全策略或客户许可协议的报告事件以支持安全遵从性审计。
For instance, different countries have different laws and regulations on the deployment of technologies and controls, and establishment of security policies. 例如,不同的国家(地区)对于技术和控制的部署和安全策略的建立有着不同的法律法规。
Along with this database, the TE implements security policies that add another level to system security. 除了这个数据库以外,TE还实现了安全策略,从而增添了另一个级别的系统安全性。
Additional factors that can complicate the deployment of tools are the company's network structure and security policies. 其他的可能使得工具部署复杂化的因素是公司的网络结构及安全规则。
Record of all security policies applied to all objects. 应用于所有对象的所有安全性策略的记录。
Next, measure the level of business risk associated with your assets according to your security policies. 接下来,根据您的安全策略,度量与您的资产相关的业务风险级别。
Security policy management: Responsible for ensuring that the security policies are consistently defined and managed across the enterprise. 安全策略管理:负责确保整个企业一致地定义和管理安全策略。
Service security focuses on managing the federated identity and access control across services, securing access to services and applications, and consistently enforcing security policies for services. 服务安全性的重点是管理联合标识和跨服务的访问控制、确保能安全访问服务和应用程序,以及使服务的安全策略得到一致执行。
To agree what security policies, standards and tools are applicable to the enterprises participating in the collaborative efforts. 为了就适用于参加协作工作的企业的安全策略、标准和工具达成一致意见。
To make access control and resource allocation effective, you have to be able to define, resolve, and enforce security policies in a consistent, robust manner. 要使访问控制和资源分配有效,您必须能够以一种统一、可靠的方式定义、解决和执行安全策略。
The value you choose for the AUTHENTICATION parameter depends on your particular environment as well as local security policies. 为AUTHENTICATION参数选择的值依赖于具体环境和本地安全策略。
Security policies are enforced with a rule-based authorization engine. 安全策略是借助一个基于规则的授权引擎来实施的。
The use of security policies is a fundamental concept in the design. 安全策略的使用是设计中的基础概念。
Like the first model type, security policies fall into three types: built-in, customized and high-level. 和第一个模型类型类似,安全策略也分为三类:内置、自定义和高级策略。
Each organization typically gives certain people the responsibility for identifying and enforcing its security policies. 每个组织通常都会让某些人负责确定和实现其安全策略。
Encrypt the request if the security policies dictate it. 如果安全策略要求,则对请求进行加密。
Governance and risk management provide the mechanism to implement and enforce security policies within the larger SOA environment. 治理和风险管理提供了在更大的SOA环境中实现和强制执行安全策略的机制。
Users are granted access to projects through Security policies, and their actions are defined by their Role. 通过安全策略,用户被授权访问项目,他们的活动是通过他们的角色定义的。
The table here lists the security policies for the security group default. 这里的表格列示了安全组default的安全策略。
As part of assigning a risk level, you have to consider the security policies assigned to the data. 作为分配风险等级的一部分,必须考虑分配给数据的安全性策略。
This is important because, as security policies change, so will the access control. 这很重要,因为随着安全策略的改变,访问控制也会发生改变。
The scope of the policy covers privacy policies and rules, security policies and rules, transactional and enforcement rules. 这个策略的范围包括了隐私策略和规则,安全性策略和规则、交易和实施规则。
For one model, you may wish to have security policies and controls built upon the foundation of technologies. 对于一个模型,您可能会希望以技术为基础构建安全策略和控制。
However, as more security is needed, new security policies can be created to restrict viewing. 然而,随着安全需求的增加,就会创建新安全策略来限制查看。
Exports information for all IP security policies to a file. 将所有ip安全策略信息导出到一个文件中。
A new addition is recognition of manipulation of the system security policies. 除了是一个新的系统安全政策操作的承认。
Third-party tools enable one to build a variety of security policies. 第三方工具使一个建立了各种安全政策。
Hydrological Information Network System Security Policies and Measures 水文情报信息网络系统的安全策略和措施
Also, the article discusses the security architecture of the network system, and gives some security policies, principles and measures for the network system in universities. 还从管理和技术两个方面对高校网络系统的安全体系作了进一步论述,并提出了高校网络系统的安全策略、安全设计的原则和措施。
Centralizing the implementation of security policies, log analysis and reporting is a good thing. 安全策略、日志分析与报告的中心化实现是个不错的主义。