...
Anchor | ||||
---|---|---|---|---|
|
While new systems are being built and configured in this zone and before they are fully vetted by security, they are firewalled in a subzone.
Host Configuration Requirements:
These systems must:
Use secure, non-default passwords.Be protected by a stateful, network firewall that only accepts connections for approved, secure remote access services.
...
Advanced Computational Health Enclave
...