X hits on this document

Powerpoint document

HHS Cybersecurity Program Training Information Security for Information Technology (IT) Administrato... - page 41 / 158

388 views

0 shares

0 downloads

0 comments

41 / 158

U.S. Department of Health and Human Services

The following are best practices to be employed during the Development phase:

Segregate systems under development from production and other development and test systems

Ensure the environmental controls are in place prior to system installation

Configure operating systems to the Department’s minimum security standards, located at: http://intranet.hhs.gov/it/cybersecurity/index.html

Avoid establishing highly privileged user accounts (e.g., admin/root), where possible

Page 5 of 5

Development Phase Security

Security Practices for IT Administrators During Development

Document info
Document views388
Page views388
Page last viewedMon Dec 05 13:35:25 UTC 2016
Pages158
Paragraphs2058
Words16945

Comments