Best IT Documents.com Blog


Sample – Word Clinical – Role Based Access Actors and Key Use Cases

Posted in Business (600),O S (375),Security (1500) by Guest on the August 7th, 2016
Comments Off on Sample – Word Clinical – Role Based Access Actors and Key Use Cases

UNIX – Home Directory Policy

Posted in Application,Business (600),O S (375),Security (1500) by Guest on the May 12th, 2016

Home Directory Construction

Policy: Home directories must be constructed in accordance with the following guidelines:

  1. Each log-on account must have a unique home directory. 
  1. Every User must have their own individual account(s) 
  1. Every person’s user-ID must be associated with their home directory. 
  1. Only files unique to the user are to be stored in their home directory. 

Shared files or group projects must be stored on a shared directory 

 

 

Home Directory Responsibilities 

Policy: Users are accountable and responsible for all materials found in their home directory.

Only work related material may be held on corporate file servers.

The materials within a user’s home directory are the property of Corporate.

The Systems Administrator will publish backup and recovery procedures for data stored within home directories.

 

Home Directory Security

Policy: Permissions on a home directory must be set to 700.
If a user decides to make their directory accessible to others, the Systems Administrator must inform the user of the risks involved. The owner of the directory is the first point of contact for any discrepancies found within the directory.

Users are responsible for virus detection on files found within their home directory. This must be done daily. Users who frequently download files from the Internet must scan for viruses after every download.

Users must own all files and subdirectories within their home directories.

File systems containing home directories may not be exported outside the Systems Administrator’s Domain.

Comments Off on UNIX – Home Directory Policy

Sample – Word – AIX Pre – Post Upgrade Checks

Posted in Business (600),Projects (400),Security (1500) by Guest on the March 14th, 2016

Word – AIX Pre – Post Upgrade Checks

AIX_Pre_Post_Upgrade_Checks.doc

 

Comments Off on Sample – Word – AIX Pre – Post Upgrade Checks

Sample Visio – RSA ESI Servers

Posted in Data Center - SOC - NOC,Security (1500),Visio Samples - Stencils (457) by Guest on the September 2nd, 2015

Free Visio document

RSA ESI Servers

 

Comments Off on Sample Visio – RSA ESI Servers

Sample Word – Visio RSA – ESI Event Source Integration

Sample Word and Vision document download

RSA – ESI Event Source Integration

 

 

Comments Off on Sample Word – Visio RSA – ESI Event Source Integration

Sample Word – Regulation and compliance log retention best practices

Posted in Compliances (1300),Policies - Standards (600),Security (1500) by Guest on the August 6th, 2015

Free word document downloads

The Basel II Accord,

FISMA,

GLBA,

HIPAA,

NERC

NISPOM,

PCI

SOX

EU

 

Comments Off on Sample Word – Regulation and compliance log retention best practices
Next Page »