On Tue, 10 Oct 2000, Ton Diening wrote:
> a) Trust that the vendor just looks at what is necessary and isn't there to
> pull coporate knowledge.
a') Monitor and log the connections.
> 1) Security waiver from the security group.
1') This type of access should be covered under the security policy- the
idea of a waiver means you expect the policy not to be followed.
Paul
-----------------------------------------------------------------------------
Paul D. Robertson "My statements in this message are personal opinions
[EMAIL PROTECTED] which may have no basis whatsoever in fact."
PSB#9280
-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]