Identity Manager Fan-Out Driver for Linux* and UNIX* 4.7 Administration Guide

Total Page:16

File Type:pdf, Size:1020Kb

Identity Manager Fan-Out Driver for Linux* and UNIX* 4.7 Administration Guide Identity Manager Fan-Out Driver for Linux* and UNIX* 4.7 Administration Guide February 23, 2018 www.netiq.com/documentation Legal Notice THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND ARE SUBJECT TO THE TERMS OF A LICENSE AGREEMENT OR A NON-DISCLOSURE AGREEMENT. EXCEPT AS EXPRESSLY SET FORTH IN SUCH LICENSE AGREEMENT OR NON-DISCLOSURE AGREEMENT, NETIQ CORPORATION PROVIDES THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESS OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. SOME STATES DO NOT ALLOW DISCLAIMERS OF EXPRESS OR IMPLIED WARRANTIES IN CERTAIN TRANSACTIONS; THEREFORE, THIS STATEMENT MAY NOT APPLY TO YOU. For purposes of clarity, any module, adapter or other similar material ("Module") is licensed under the terms and conditions of the End User License Agreement for the applicable version of the NetIQ product or software to which it relates or interoperates with, and by accessing, copying or using a Module you agree to be bound by such terms. If you do not agree to the terms of the End User License Agreement you are not authorized to use, access or copy a Module and you must destroy all copies of the Module and contact NetIQ for further instructions. This document and the software described in this document may not be lent, sold, or given away without the prior written permission of NetIQ Corporation and Omnibond Systems, LLC., except as otherwise permitted by law. Except as expressly set forth in such license agreement or non-disclosure agreement, no part of this document or the software described in this document may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, or otherwise, without the prior written consent of NetIQ Corporation and Omnibond Systems, LLC.. Some companies, names, and data in this document are used for illustration purposes and may not represent real companies, individuals, or data. This document could include technical inaccuracies or typographical errors. Changes are periodically made to the information herein. These changes may be incorporated in new editions of this document. NetIQ Corporation and Omnibond Systems, LLC. may make improvements in or changes to the software described in this document at any time. U.S. Government Restricted Rights: If the software and documentation are being acquired by or on behalf of the U.S. Government or by a U.S. Government prime contractor or subcontractor (at any tier), in accordance with 48 C.F.R. 227.7202- 4 (for Department of Defense (DOD) acquisitions) and 48 C.F.R. 2.101 and 12.212 (for non-DOD acquisitions), the government’s rights in the software and documentation, including its rights to use, modify, reproduce, release, perform, display or disclose the software or documentation, will be subject in all respects to the commercial license rights and restrictions provided in the license agreement. © 2018 Omnibond Systems, LLC. All Rights Reserved. Licensed to NetIQ Corporation. Portions copyright © 2018 NetIQ Corporation. All Rights Reserved. For information about NetIQ trademarks, see https://www.netiq.com/company/legal/. NetIQ Trademarks For NetIQ trademarks, see the NetIQ Trademark and Service Mark list (http://www.novell.com/company/legal/trademarks/ tmlist.html). Third-Party Materials All third-party trademarks are the property of their respective owners. Contents About this Book and the Library 11 About NetIQ Corporation 13 Part I Concepts and Facilities 15 1 Introduction 17 1.1 Driver Highlights. 17 1.2 Driver Organization . 17 2 Structure and Function 19 2.1 Core Driver. 20 2.1.1 Core Driver Component Details. 21 2.2 Platform Services . 23 2.2.1 User and Group Management . 24 2.2.2 User Authentication . 24 2.2.3 Platform Configuration File . 26 2.3 Directory Objects . 26 2.3.1 The ASAM Master User Object . 27 2.3.2 Configuration-Oriented Objects . 27 2.3.3 Census Container . 27 2.3.4 Platform Objects . 29 2.3.5 Platform Set Objects . 29 2.4 Migration . 30 3 Examples 31 3.1 Password Check for Login . 32 3.2 User Added to eDirectory. 32 3.3 Census Trawl . 33 3.4 User Deleted from eDirectory. 34 3.5 Group Deleted from eDirectory . 35 3.6 User Added to a Group . 35 Part II Core Driver Administration 37 4 Core Driver Planning 39 4.1 Configuration Planning. 39 4.2 Configuration and Performance Guidelines . 41 4.2.1 eDirectory . 42 4.2.2 Object Services and the Event Subsystem . 42 4.2.3 Event Journal Services . 43 4.2.4 Authentication Services . 43 4.2.5 Platform Systems. 43 4.2.6 Platform Services / Authentication Services Relationship . 43 4.3 Requirements. 44 4.3.1 User Rights Requirements. 44 Contents 3 4.3.2 Password Replication Requirements. 44 4.3.3 Core Driver Requirements . 44 4.3.4 Requirements for Workstations Used for Installation and Administration . 45 4.3.5 Platform Services Requirements . 46 5 Installing the Core Driver 47 5.1 Preparing for Core Driver Installation . 47 5.1.1 Essentials . 47 5.1.2 Other Advance Considerations . 47 5.1.3 General Installation Sequence. .49 5.2 Step-By-Step Installation Instructions. 50 5.2.1 Installing the Driver Shim on Linux or Solaris . 51 5.2.2 Installing the Driver Shim on Windows Systems . 54 5.2.3 Setting Up the Core Driver in iManager. 58 5.2.4 Other Tasks Following Installation . 61 5.3 Activating the Driver After Evaluation. 64 5.4 Performance Tuning. 64 5.4.1 Secondary Drivers . 64 5.4.2 Platform Operation Modes. 64 6 Configuring and Administering the Core Driver 67 6.1 Configuration Overview . 67 6.1.1 Core Driver Configuration . 67 6.1.2 Platform Services Configuration . 67 6.2 Driver System Security Overview. 68 6.2.1 Connection Security. 68 6.2.2 ASAM Master User Security . ..
Recommended publications
  • Security on the Mainframe Stay Connected to IBM Redbooks
    Front cover Security on the IBM Mainframe Operating system and application security IBM Security Blueprint and Framework IBM mainframe security concepts Karan Singh Lennie Dymoke-Bradshaw Thomas Castiglion Pekka Hanninen Vincente Ranieri Junior Patrick Kappeler ibm.com/redbooks International Technical Support Organization Security on the IBM Mainframe April 2010 SG24-7803-00 Note: Before using this information and the product it supports, read the information in “Notices” on page ix. First Edition (April 2010) This edition applies to the IBM System z10 Enterprise Class server, the IBM System z10 Business Class server, and Version 1, Release 11, Modification 0 of z/OS (product number 5694-A01). © Copyright International Business Machines Corporation 2010. All rights reserved. Note to U.S. Government Users Restricted Rights -- Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents Notices . ix Trademarks . .x Preface . xi The team who wrote this book . xi Now you can become a published author, too! . xii Comments welcome. xii Stay connected to IBM Redbooks . xiii Part 1. Introduction . 1 Chapter 1. Introduction. 3 1.1 IBM Security Framework. 4 1.1.1 People and identity . 5 1.1.2 Data and information. 5 1.1.3 Application and process . 5 1.1.4 Network, server, and endpoint . 5 1.1.5 Physical Infrastructure . 6 1.2 Framework and Blueprint . 7 1.3 IBM Security Blueprint. 7 Chapter 2. Security of the IBM Mainframe: yesterday and today . 13 2.1 Operating systems . 14 2.1.1 z/OS operating system family . 14 2.1.2 z/VM Hypervisor family .
    [Show full text]
  • CA ACF2 for Z/OS Quick Reference Guide
    CA ACF2™ for z/OS Quick Reference Guide r12 Third Edition This documentation and any related computer software help programs (hereinafter referred to as the "Documentation") are for your informational purposes only and are subject to change or withdrawal by CA at any time. This Documentation may not be copied, transferred, reproduced, disclosed, modified or duplicated, in whole or in part, without the prior written consent of CA. This Documentation is confidential and proprietary information of CA and may not be used or disclosed by you except as may be permitted in a separate confidentiality agreement between you and CA. Notwithstanding the foregoing, if you are a licensed user of the software product(s) addressed in the Documentation, you may print a reasonable number of copies of the Documentation for internal use by you and your employees in connection with that software, provided that all CA copyright notices and legends are affixed to each reproduced copy. The right to print copies of the Documentation is limited to the period during which the applicable license for such software remains in full force and effect. Should the license terminate for any reason, it is your responsibility to certify in writing to CA that all copies and partial copies of the Documentation have been returned to CA or destroyed. TO THE EXTENT PERMITTED BY APPLICABLE LAW, CA PROVIDES THIS DOCUMENTATION "AS IS" WITHOUT WARRANTY OF ANY KIND, INCLUDING WITHOUT LIMITATION, ANY IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, OR NONINFRINGEMENT. IN NO EVENT WILL CA BE LIABLE TO THE END USER OR ANY THIRD PARTY FOR ANY LOSS OR DAMAGE, DIRECT OR INDIRECT, FROM THE USE OF THIS DOCUMENTATION, INCLUDING WITHOUT LIMITATION, LOST PROFITS, LOST INVESTMENT, BUSINESS INTERRUPTION, GOODWILL, OR LOST DATA, EVEN IF CA IS EXPRESSLY ADVISED IN ADVANCE OF THE POSSIBILITY OF SUCH LOSS OR DAMAGE.
    [Show full text]
  • CA ACF2™ R14 SP1 for Z/OS Security Target
    CA ACF2™ r14 SP1 for z/OS Security Target Version 1.1 March 7, 2011 Prepared for: CA 2400 Cabot Drive Lisle, IL 60532 Prepared by: Booz Allen Hamilton Common Criteria Testing Laboratory 900 Elkridge Landing Road, Suite 100 Linthicum, MD 21090-2950 Page 1 Table of Contents 1 Security Target Introduction ....................................................................................... 7 1.1 ST Reference ....................................................................................................... 7 1.1.1 ST Identification ............................................................................................. 7 1.1.2 Document Organization .................................................................................. 7 1.1.3 Terminology .................................................................................................... 8 1.1.4 Acronyms ...................................................................................................... 10 1.1.5 References ..................................................................................................... 11 1.1.6 CC Concepts ................................................................................................. 11 1.2 TOE Reference.................................................................................................. 12 1.2.1 TOE Identification ........................................................................................ 12 1.3 TOE Overview .................................................................................................
    [Show full text]
  • IBM Multi-Factor Authentication for Z/OS
    IBM Multi-Factor Authentication for z/OS Ross Cooper, *CISSP IBM z/OS Security Software Design and Development NewEra – The z Exchange 10/24/2017 Current Security Landscape 1,935 81% Number of security incidents Number of breaches in 2016 with confirmed data due to stolen and/or disclosure as a result of weak passwords.1 stolen credentials.1 (18% worse than prior year) (506 worse than prior year) 60% $4 million Number of security The average total cost incidents that are from 2 of a data breach. insider threats. 3 Criminals are identifying key employees at organizations and exploiting them with savvy phishing attacks to gain initial access to the employees’ system and steal their account credentials. This puts emphasis on the need for tighter restrictions on access privileges to key data repositories.1 1 2017 Verizon Data Breach Investigations Report 2 Ponemon: 2016 Cost of Data Breach Study: Global Analysis 2 3 IBM X-Force 2016 Cyber Security Intelligence Index User Authentication Today on z/OS • Users can authenticate with: ‒ Passwords ‒ Password phrases ‒ Digital Certificates ‒ via Kerberos • Problems with passwords: ‒ Common passwords ‒ Employees are selling their passwords ‒ Password reuse ‒ People write down passwords ‒ Malware ‒ Key log ‒ Password cracking 3 Compliance PCI DSS v3.2 8.3 Secure all individual non-console administrative access and all remote access to the CDE using multi-factor authentication. 8.3.1 Incorporate multi-factor authentication for all non-console access into the Cardholder Data Environment (CDE) for personnel with administrative access. Note: This requirement is a best practice until January 31, 2018, after which it becomes a requirement.
    [Show full text]
  • CNS Lecture 13
    In the news CNS Lecture 13 Microsoft workstation server buffer overflow Microsoft XML core services remote code execution Network defenses Microsoft agent buffer overflow IPsec WinZip remote code execution Virtual Private Networks (VPNs) Wireless security Kerberos Trusted systems Secure OS CNS Lecture 13 - 2 Network security You are here … Attacks & Defenses Cryptography Applied crypto VULNERABILITIES COUNTERMEASURES • denial of service • disable denial of service disable • Risk assessment •Random numbers •SSH – ICMP smurf, redirects, unreachable • configure properly – SYN flooding • xinetdxinetd,, tcpwrappers • Viruses – frag, teardrop – filters (allow, deny) •Hash functions •PGP • • Unix security impersonationimpersonation – audit and alarm – host rename (LAN) • filtering portmap MD5, SHA,RIPEMD • • S/Mime – DNS • application filtering ((securelibsecurelibsecurelib)))) authentication – source routing • patches • Network security •Classical + stego •SSL • Session capture/modification • scanners ((NessusNessusNessus,, ISS) – TCP seq number guessing • Firewalls,vpn,IPsec,IDS firewalls •Number theory •Kerberos – TCP hijacking • intusionintusion detection & response • Forensics – sniffing • encryption, virtual private networks ((VPNsVPNsVPNs)))) • • • Server/application attacks Symmetric key IPsec – application flooding (ftp,mail,echo) – buffer overflows DES, RijndaelRijndael,, RC5 •Crypto APIs – Software bugs •Public key •Secure coding RSA, DSA, DD----H,ECCH,ECC CNS Lecture 13 - 3 CNS Lecture 13 - 4 Where to encrypt? Internet
    [Show full text]
  • Identity Manager 3.6.1 Fan-Out Driver for Linux and UNIX Administration Guide Novdocx (En) 24 March 2009
    novdocx (en) 24 March 2009 March 24 (en) novdocx AUTHORIZED DOCUMENTATION Administration Guide Novell® Identity Manager Fan-Out Driver for Linux* and UNIX* 3.6.1 December 10, 2009 www.novell.com Identity Manager 3.6.1 Fan-Out Driver for Linux and UNIX Administration Guide novdocx (en) 24 March 2009 March 24 (en) novdocx Legal Notices Novell, Inc. and Omnibond Systems LLC. make no representations or warranties with respect to the contents or use of this documentation, and specifically disclaim any express or implied warranties of merchantability or fitness for any particular purpose. Further, Novell, Inc. and Omnibond Systems LLC. reserve the right to revise this publication and to make changes to its content, at any time, without obligation to notify any person or entity of such revisions or changes. Further, Novell, Inc. and Omnibond Systems LLC. make no representations or warranties with respect to any software, and specifically disclaim any express or implied warranties of merchantability or fitness for any particular purpose. Further, Novell, Inc. and Omnibond Systems LLC. reserve the right to make changes to any and all parts of the software, at any time, without any obligation to notify any person or entity of such changes. Any products or technical information provided under this Agreement may be subject to U.S. export controls and the trade laws of the other countries. You agree to comply with all export control regulations and to obtain any required licenses or classification to export, re-export or import deliverables. You agree not to export or re-export to entities on the current U.S.
    [Show full text]
  • IT Acronyms at Your Fingertips a Quick References Guide with Over 3,000 Technology Related Acronyms
    IT Acronyms at your fingertips A quick references guide with over 3,000 technology related acronyms IT Acronyms at your Fingertips We’ve all experienced it. You’re sitting in a meeting and someone spouts off an acronym. You immediately look around the table and no one reacts. Do they all know what it means? Is it just me? We’re here to help! We’ve compiled a list of over 3,000 IT acronyms for your quick reference and a list of the top 15 acronyms you need to know now. Top 15 acronyms you need to know now. Click the links to get a full definition of the acronym API, Application Programmer Interface MDM, Mobile Device Management AWS, Amazon Web Services PCI DSS, Payment Card Industry Data Security Standard BYOA, Bring Your Own Apps SaaS, Software as a Service BYOC, Bring Your Own Cloud SDN, Software Defined Network BYON, Bring Your Own Network SLA, Service Level Agreement BYOI, Bring Your Own Identity VDI, Virtual Desktop Infrastructure BYOE, Bring Your Own Encryption VM, Virtual Machine IoT, Internet of Things Quick Reference, over 3000 IT acronyms Click the links to get a full definition of the acronym Acronym Meaning 10 GbE 10 gigabit Ethernet 100GbE 100 Gigabit Ethernet 10HD busy period 10-high-day busy period 1170 UNIX 98 121 one-to-one 1xRTT Single-Carrier Radio Transmission Technology 2D barcode two-dimensional barcode Page 1 of 91 IT Acronyms at your Fingertips 3270 Information Display System 3BL triple bottom line 3-D three dimensions or three-dimensional 3G third generation of mobile telephony 3PL third-party logistics 3Vs volume, variety and velocity 40GbE 40 Gigabit Ethernet 4-D printing four-dimensional printing 4G fourth-generation wireless 7W seven wastes 8-VSB 8-level vestigial sideband A.I.
    [Show full text]
  • Java Security and Z/OS
    Front cover Java Security on z/OS - The Complete View Comprehensively describes z/OS security services for Java applications Provides use cases illustrated with Java program examples Discusses industry-class Java applications Patrick Kappeler Jonathan Barney Pierre Béda Michael Buzzetti Saheem Granados Ebbe Mølgaard Pedersen Kin Ng Michael Onghena Eysha Powers Martina Schmidt Richard Schultz ibm.com/redbooks International Technical Support Organization Java Security on z/OS - The Complete View December 2008 SG24-7610-00 Note: Before using this information and the product it supports, read the information in “Notices” on page ix. First Edition (December 2008) This edition applies to Version 1, Release 10 of z/OS (Program Number 5694-A01). © Copyright International Business Machines Corporation 2008. All rights reserved. Note to U.S. Government Users Restricted Rights -- Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents Notices . ix Trademarks . .x Preface . xi The team that wrote this book . xi Become a published author . xiii Comments welcome. xiii Part 1. Java and Security . 1 Chapter 1. Overview of Java on z/OS . 3 1.1 Why to choose Java . 4 1.1.1 Introduction to the Java programming language. 4 1.1.2 Java package . 4 1.2 Java Native Interface . 5 1.2.1 Basic elements of the Java Native Interface. 6 1.2.2 JNI and Security . 9 1.3 Accessing z/OS MVS datasets from Java. 9 1.3.1 Using the Java Record I/O API . 10 1.3.2 Using the JZOS toolkit API . 10 1.3.3 Running a Java program as a batch job .
    [Show full text]
  • A Short Course Computer Viruses
    A Short Course on Computer Viruses by Dr. Frederick B. Cohen Copyright c ASP Press, 1990 { All Rights Reserved ISBN# 1-878109-01-4 ASP Press PO Box 81270 Pittsburgh, PA 15217 USA Contents 0.1 Introduction 1 Computer Virus Basics 1.1 What is a Computer Virus? 1.2 How Do Viruses Spread Through Systems? 1.3 What Damage Could A Malicious Virus Do? 1.4 Some Other Things Malicious Viruses Might Do 1.4.1 A Data Diddling Virus 1.4.2 The Random Deletion Virus 1.4.3 A Production Destruction Virus 1.4.4 A Protection Code Changing Virus 1.4.5 A Network Deadlock Virus 1.4.6 An Ex- ecutive Error Virus 1.4.7 A Covert Channel Virus 1.4.8 Synergism in Attack 1.5 What Could a Benevolent Virus Do? 1.5.1 Maintenance Viruses 1.5.2 Distributed Databases with Viruses 1.5.3 Life for Its Own Sake 1.5.4 Practical Limits 1.6 Viruses in Specific Computing Environments 1.6.1 Viruses in MVS 1.6.2 PC, MacIntosh, and Amiga Viruses 1.6.3 Viruses in Unix and VMS 1.6.4 Viruses in LANs 1.7 The Three Differ- ences 1.7.1 Generality 1.7.2 Range of Effect 1.7.3 Persistence 1.8 High Risk Activities 1.9 Summary 2 Real World Viruses 2.1 Some Early Experiments 2.1.1 The First Scientific Experiment 2.1.2 A Compression Virus 2.1.3 A Bell-LaPadula Based System 2.1.4 Instrumentation 2.1.5 Psychological Effects of Experi- ments 2.2 The Computer Virus Record Book 2.2.1 The Smallest 2.2.2 The Fastest on a PC 2.2.3 Spreading in Networks 2.2.4 Other Time Dependent Indications of Interest 2.3 Real World Computer Viruses 2.3.1 The Xerox Worm 2.3.2 The First Maintenance Viruses 2.3.3 The Lehigh
    [Show full text]
  • The Problem with Passwords
    EXECUTIVE BRIEFING The problem with passwords Enhancing your mainframe security: password insecurity, data breaches and multi-factor authentication Mark Wilson, Technical & Security Director, RSM Partners Ltd - Discussion Paper Introduction: stronger by design? Mainframe systems are built to be both reliable to steal system logins and credentials. If you are still and scalable, more so than most other systems and authenticating users with passwords alone then moving endpoints. The problem is their security is often taken to multi-factor authentication (MFA) is long overdue. for granted. This should be of serious concern, given that around 80% of the world’s system-of-record data Securing the mainframe: protecting resides on mainframe systems, and more commercial your critical assets transactions are processed on mainframes than on any other platform. Too often, however, mainframe security ● Mainframes hold 80% of the world’s business data has failed to be a priority, with the standard security ● Mainframes host critical core IT for 92 of the world’s posture that everyone has read access to everything. top 100 banks, 18 of the world’s 25 top retailers, Just because a mainframe is deep within a network, 23 of the 25 top airlines, all of the world’s top 10 behind three firewalls, and at the back of your data insurers – and 71% of Fortune 500 companies center, doesn’t mean it is secure. To the bad actors the ● Mainframes host more transactions daily mainframe is simply “another server” to be attacked. than Google (1.3m/second CICS versus 68,542/ second Google) - including 55% of all enterprise Arguably the greatest threats are insider threats: the bad transactions actors won’t be looking to target a system or application Mainframes handle 90% of all credit card but are more likely to target individuals and attempt ● transactions Scary stuff: password insecurity Standard mainframe security approaches are not names.
    [Show full text]
  • CA ACF2™ R15 for Z/OS
    PRODUCT SHEET: CA ACF2 FOR z/OS we can CA ACF2™ r15 for z/OS CA ACF2™ for z/OS (CA ACF2™) provides innovative, comprehensive security for your business transaction environments, including z/OS UNIX and mainframe LINUX — helping your business realize the reliability, scalability and cost-effectiveness of the mainframe. In conjunction with CA Technologies distributed security solutions, CA AFC2 helps secure your entire enterprise. Overview There is increased concern about the security issues that arise when establishing Web links to valuable mainframe data. Many organizations are also required to comply with government regulations, including HIPAA, SOX, PCI and GLBA, and existing corporate policies and industry agreements. With the introduction of new technologies for the mainframe, new security and compliance concerns are rapidly developing. To stay abreast of today’s challenges, organizations must strengthen security, streamline administration and provide enhanced auditing and compliance capabilities. Benefits CA ACF2 delivers out-of-the-box access control software for z/OS operating systems, which includes interfaces for CICS, z/OS Unix (formerly known as OMVS) and IMS (and an optional add-on for DB2). CA ACF2 mechanisms provide flexibility and control to help you monitor and adjust your security policies and accommodate virtually all organizational structures. Administrative tools, extensive reporting options, online monitoring and automatic logging capabilities accompany CA ACF2 to secure your environment while enabling comprehensive auditing and controlled sharing of data and resources. CA ACF2 r15 for z/OS Mainframe 2.0 CA ACF2 has adopted key Mainframe 2.0 features that are designed to simplify your use of CA ACF2 can enable your staff to install, deploy and maintain it more effectively and quickly.
    [Show full text]
  • Supplier Security Standard
    Supplier Security Standard Effective Date: October 2020 Table of Contents 1.0 Introduction and Purpose ....................................................................................................................... 5 2.0 Supplier Security Requirements ........................................................................................................... 6 2.1 Comprehensive Security Program & Practices ............................................................................ 6 2.2 Supplier Personnel .......................................................................................................................... 7 2.3 Duty of Care & Use Restrictions .................................................................................................... 8 2.4 Return/Destruction/Maintenance of Scoped IT Assets ............................................................. 8 2.5 Physical Security ............................................................................................................................. 9 2.6 Network & Communications Security ......................................................................................... 10 2.7 Infrastructure/Platforms/Services/Desktop/Operations Security ........................................ 10 2.8 Additional Software Provisions .................................................................................................... 12 2.9 Identity and Access Management ..............................................................................................
    [Show full text]