Примеры использования Security policies and operational на Английском языке и их переводы на Русский язык
{-}
-
Official
-
Colloquial
Examine documentation and interview personnel to verify that security policies and operational procedures for managing firewalls are.
Ensure that security policies and operational procedures for managing firewalls are documented, in use, and known to all affected parties.
Examine documentation and interview personnel to verify that security policies and operational procedures for protecting stored cardholder data are.
Ensure that security policies and operational procedures for protecting systems against malware are documented, in use, and known to all affected parties.
Examine documentation and interview personnel to verify that security policies and operational procedures for protecting systems against malware are.
Ensure that security policies and operational procedures for encrypting transmissions of cardholder data are documented, in use, and known to all affected parties.
Examine documentation and interview personnel to verify that security policies and operational procedures for encrypting transmissions of cardholder data are.
Ensure that security policies and operational procedures for restricting physical access to cardholder data are documented, in use, and known to all affected parties.
Examine documentation and interview personnel to verify that security policies and operational procedures for security monitoringand testing are.
Ensure that security policies and operational procedures for security monitoringand testing are documented, in use, and known to all affected parties.
Examine policies and procedures to verify that processes are defined for reviewing and confirming that personnel are following security policies and operational procedures, and that reviews cover.
Personnel need to be aware of and following security policies and operational procedures to ensure systems are protected from malware on a continuous basis.
Ensure that security policies and operational procedures for monitoring all access to network resourcesand cardholder data are documented, in use, and known to all affected parties.
Personnel need to be aware of and following security policies and operational procedures for managing identification and authorization on a continuous basis.
Ensure that security policies and operational procedures for developingand maintaining secure systems and applications are documented, in use, and known to all affected parties.
Examine documentation and interview personnel to verify that security policies and operational procedures for monitoring all access to network resources and cardholder data are.
Personnel need to be aware of and following security policies and operational procedures to ensure firewalls and routers are continuously managed to prevent unauthorized access to the network.
Examine documentation and interview personnel to verify that security policies and operational procedures for developingand maintaining secure systems and applications are.
Personnel need to be aware of and following security policies and operational procedures to ensure systemsand applications are securely developed and protected from vulnerabilities on a continuous basis.
Examine documentation and interview personnel to verify that security policies and operational procedures for managing vendor defaultsand other security parameters are.
Personnel need to be aware of and following security policies and operational procedures to ensure that access is controlledand based on need- to-know and least privilege, on a continuous basis.
Personnel need to be aware of and following security policies and operational procedures for managing the secure transmission of cardholder data on a continuous basis.
Promote cooperation and coordination between traditional security(policy and operational) agenciesand new players such as health and agricultural agencies which, traditionally, have had little counter-proliferation or counter-terrorism involvement.
Personnel need to be aware of and following security policies and daily operational procedures for monitoring all access to network resources and cardholder data on a continuous basis.
Personnel need to be aware of and following security policies and documented operational procedures for managing the secure storage of cardholder data on a continuous basis.
Personnel need to be aware of and following security policies and daily operational procedures to ensure vendor defaults and other security parameters are continuously managed to prevent insecure configurations.
We urge transparency in their work and express particular interest in their perspectives on reducing the size of nuclear arsenals,role of nuclear weapons in military and security policies, and the operational status of nuclear weapon systems, transparency and confidence building.
Developing security and security-related management policies and operational guidelines for its considerationand subsequent consideration by the United Nations High-level Committee on Management and CEB;
We encourage nuclear-armed States to reassess and limit the role of nuclear weapons in their security policies and to reduce further the operational status of their nuclear weapons in ways that promote global security and stability.
We urge transparency in their work and express particular interest in their perspectives on reducing the size of nuclear arsenals,the role of nuclear weapons in military and security policies and the operational status of nuclear weapon systems, transparency and confidence-building.