Precautions for system use

Physical security
The location where the product is installed and operated must be equipped with access controls and protective measures to allow entry only to authorized administrators.
Trusted administrators
Authorized administrators must be trustworthy, properly trained on product management functions, and perform their duties accurately in accordance with administrator guidelines.
Operating system hardening
Authorized administrators must perform updates and patches to address the latest vulnerabilities in the operating system where the product is installed, ensuring its reliability and security.
Timestamp
The product must use a trusted timestamp provided by the operational environment to accurately record security-related events.
Trusted external servers
SMTP and OS integrated with the product must maintain secure and reliable operations.
Audit data storage
To prevent loss of administrator audit records, regularly check the available space in the audit data storage and back up audit records as necessary to avoid exhaustion.
DBMS
Audit data must be stored in a DBMS running in a physically secure environment.
Administrative access
The confidentiality and integrity of data transmitted between the administrator’s PC web browser and the web server operating the management server must be ensured.
Have more questions? Submit a request