User Tools

Site Tools


securitypolicy

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

securitypolicy [2011/09/09 12:25]
elyoliveira
securitypolicy [2012/10/30 10:27] (current)
Line 23: Line 23:
     * Software installations, configurations, and updates.     * Software installations, configurations, and updates.
     * User management.     * User management.
-    * Certification management, including:+    * Certificates management, including:
       * creation, renewal, and revocation of certificates using the mySmartGrid Certification Authority (MSG-CA);       * creation, renewal, and revocation of certificates using the mySmartGrid Certification Authority (MSG-CA);
       * request and replacement of certificates signed by external CAs.       * request and replacement of certificates signed by external CAs.
Line 52: Line 52:
   * **Worker** - Any member of the mySmartGrid team, who works with the computer systems and data managed in the project. He is required to follow the guidelines listed bellow, except in special cases determined by the //Coordinator//.   * **Worker** - Any member of the mySmartGrid team, who works with the computer systems and data managed in the project. He is required to follow the guidelines listed bellow, except in special cases determined by the //Coordinator//.
     * The computer systems must be exclusively used for activities related with the mySmartGrid project.     * The computer systems must be exclusively used for activities related with the mySmartGrid project.
-    * External users should not be given access to any computer systems, except via user accounts on the web portal running on //S2//.+    * External users should not be given access to any computer system, except via user accounts on the web portal running on //S2//.
     * All data stored in these systems is confidential, and must not leave the ITWM network.     * All data stored in these systems is confidential, and must not leave the ITWM network.
     * Passwords must be kept in safe locations within the ITWM network, such as encrypted keystores. They are never to be emailed or copied to external media devices.     * Passwords must be kept in safe locations within the ITWM network, such as encrypted keystores. They are never to be emailed or copied to external media devices.
securitypolicy.1315563952.txt.gz ยท Last modified: 2012/10/30 10:36 (external edit)