Read or Download API Std 1164 SCADA Security, First Edition PDF
Similar nonfiction_3 books
This moment variation of Hilbe's unfavourable Binomial Regression is a considerable enhancement to the preferred first variation. the one textual content dedicated completely to the adverse binomial version and its many diversifications, approximately each version mentioned within the literature is addressed. The theoretical and distributional historical past of every version is mentioned, including examples in their development, software, interpretation and review.
- The Cervix, 2nd edition
- Visionary ascents of moses in Pseudo-Philo's Liber Antiquitatum Biblicarum: Apocalyptic motifs and the growth of visionary Moses tradition
- [Magazine] Scientific American. Vol. 274. No 1
- Learning to Work: Students' Experiences During Work Placements
- Fairyland 2 : Activity Book
- Bacterial Chromatin
Additional info for API Std 1164 SCADA Security, First Edition
A BCP shall be reviewed and updated at least annually in order to be current. The time frame for resuming system processing in the BCP/DRP is consistent with business requirements and recovery strategies. ). Only the operator may authorize personnel (information custodians, system administrators) to recall backups and perform restores. The plan shall include an inventory of all systems software necessary and sufficient to reconstruct the processing environment and to support critical applications.
After an employee or contractor leaves the company, there shall be no re-use of any user accounts associated with that employee or contractor, unless reassigned to the same person. --`,,,,,`,````,,,,`````,`,``,,``-`-`,,`,,`,`,,`--- Users are responsible for all activity performed with their personal user accounts. User accounts may not be utilized by anyone but the individuals to whom they have been issued. Users shall not allow others to perform any activity with their user accounts. 38 API STANDARD 1164 Authentication Standards (Continued) In-place/ Required/ Not needed Verified by: Users with privileged access (system administrators) shall be assigned a separate, unique account, different from their non-privileged account.
The use of superuser/administrative accounts that are not uniquely assigned to an individual shall be limited to only those situations absolutely necessary to maintain pipeline operations. Complexity rules shall be implemented within the operating system functionality. If a system has no password complexity functionality (or it is insufficient), then a password filter or other compensating control shall be implemented. General users and administrators: — password expiration: 90 days, — eight (8) character minimum length, — passwords shall be composed of a combination of letters and numbers and can include symbols, Service account (host-to-host data transfer accounts): — password expiration: when an individual who knows the password changes roles, — 14 character minimum length, — passwords shall be composed of a combination of letters and numbers and symbols, — when the system capability exists password history shall be enabled and with the last 12 encrypted passwords stored per user.