...
Systems or their administrators must:
- Use For production systems, use two-factor authentication for administrative remote access, or request an exemption from Security.
- Disable routing, traffic forwarding, bridging between subnets and other forms of internetwork traffic proxy through the host unless approved by Security & Networking.
- Where possibleFor production hosts, forward system logs to the NSCA syslog collector.
...