这场过热但经常中肯的论战的读者们会下结论,最安全的策略是有机食品和一个苍蝇拍。
Readers of this overheated but often on-the-mark polemic will conclude that the safest tactic is organic food and a fly swatter.
如果安全策略要求,则对请求进行解密。
如果安全策略要求,则对请求进行加密。
此外,功能声明说明了安全策略,以便多种服务可以参与安全事务通信。
Moreover, the capability declaration notes security policy so that multiple services can participate in a secure transaction communication.
首先,您可以使用约束来增强阀值策略的安全处理。
First, you can use constraints to enhance security posture to threshold policies.
需要有威胁检测规则并执行安全策略。
Threat detection rules and security policy enforcement are needed.
云安全策略主要关注用户管理、数据保护和虚拟机保护。
A cloud security policy focuses on managing users, protecting data, and securing virtual machines.
图5:安全策略提供访问权限,角色定义允许操作。
Figure 5: Security Polices provide access, and Roles define Allowed Actions.
STS安全配置嵌在安全对话令牌的策略定义中。
The STS security configuration is nested inside the policy definition of the secure conversation token.
还提供了通过策略实现的服务安全访问控制。
Secure access control for services using policies is also provided.
对不遵守安全策略的条款和条件的处罚。
Security penalties for not complying with all of the security policy's terms and conditions.
所需的全部安全执行策略
尽管某些安全细节可以作为策略的一部分,但并非所有安全需求都必须成为策略的一部分。
Though some specifics of security can be part of the policy, not all the security requirements need to be part of the policy.
如果用户拥有安全策略使用的每个规则的豁免权,那么该用户将拥有受那个安全策略保护的所有数据的完全访问权。
If the user holds an exemption to every rule used by a security policy, then the user will have complete access to all data protected by that security policy.
如果你有很好的密码策略的话,你还能看到用户锁定策略,因此这不是一个很大的安全问题。
If you have good password policies, which also include lockout policies, then it is not that big a security issue.
一个安全标签归属于一个安全策略,并且为安全策略中的每个安全组件包含一个值。
A security label belongs to a security policy and contains a value for each security component in that security policy.
这使安全管理员能够通过启用几个策略,组合出更复杂的公开效果,同时保持各个策略简单且直观。
This allows the security administrator to compose more complex disclosure effects by enabling several policies, while each individual policy is relatively simple and intuitive.
这个策略的范围包括了隐私策略和规则,安全性策略和规则、交易和实施规则。
The scope of the policy covers privacy policies and rules, security policies and rules, transactional and enforcement rules.
SCA提供了定义诸如安全类型以及SLA等的策略的能力,这些策略能够跨应用系统使用。
SCA provides the ability to define policy sets such as types of security and SLAs that can be reused across applications.
所有SOA安全的核心都是基于策略的基础设施和策略的管理。
At the core of all SOA security is a policy-based infrastructure and management of the policies.
本文并不讨论如何保护 AIX或如何实现安全策略,而是讨论与密码策略相关的应该注意的属性。
This article is not a guide on AIX hardening or how to implement a security policy, but rather attributes relating to password policies that should be considered.
SECLABEL_BY_NAME:该函数通过指定一个安全策略和这个安全策略中一个安全标签的名称,构建一个安全标签(内部编码表示)。
SECLABEL_BY_NAME: This function builds a security label (internal encoded representation) by specifying a security policy and the name of a security label that is part of that security policy.
管理员能够定于安全策略,并授权项目经理选择对于他们的项目最好的安全策略。
Administrators can define security policies upfront, and empower project managers to choose the policy that best applies to their project.
制定安全策略需要提前进行计划,解决应该如何声明策略的用途、范围和背景的问题。
Crafting a security policy requires planning ahead of time to resolve the issues on how purpose, scope, and background of the policy should be stated.
安全配置向导允许你创建基于XML的安全策略。它们可以应用到你的服务器上。
The security Configuration Wizard allows you to create XML-based security policies, which can then be applied to your servers.
RFIDIC定义的所有安全策略都具有allow语义,这意味着策略定义哪些数据是可以公开的。
ALL security policies defined with RFIDIC have ALLOW semantics, meaning, the policies define what data can be disclosed.
在安全策略边界内,指定由提供商托管并由使用者租用和预订的云服务类型、应用的阈值策略以及应用安全策略的方式。
Within its boundaries, specify which cloud service type the provider hosts and the consumers rents and subscribe, what threshold policies are applied, and how the security policy is applied.
访问控制—使系统能够识别用户组的安全性策略。
Access control. Enables the system to recognize security policies for groups of users.
业务策略在同一个时间跨越所有作用范围,如安全性、业务过程、总体架构和操作策略。
Where the business policy spans subject areas like security, business process, overall architecture and operational policies all at the same time.
创建好安全策略后,安全管理员创建安全标签,安全标签也是安全策略的一部分。
After creating a security policy, the security administrator creates objects, called security labels that are also part of that policy.
应用推荐