- Physical security
- The location where the product is installed and operated must be equipped with access controls and protective measures to allow entry only to authorized administrators.
- Trusted administrators
- Authorized administrators must be trustworthy, properly trained on product management functions, and perform their duties accurately in accordance with administrator guidelines.
- Operating system hardening
- Authorized administrators must perform updates and patches to address the latest vulnerabilities in the operating system where the product is installed, ensuring its reliability and security.
- Timestamp
- The product must use a trusted timestamp provided by the operational environment to accurately record security-related events.
- Trusted external servers
- SMTP and OS integrated with the product must maintain secure and reliable operations.
- Audit data storage
- To prevent loss of administrator audit records, regularly check the available space in the audit data storage and back up audit records as necessary to avoid exhaustion.
- DBMS
- Audit data must be stored in a DBMS running in a physically secure environment.
- Administrative access
- The confidentiality and integrity of data transmitted between the administrator’s PC web browser and the web server operating the management server must be ensured.
Have more questions? Submit a request