Organizational security policies.
组织安全性策略。
Create Security Policies.
创建安全策略。
An ESB gateway that handles security policies.
一个ESB网关,处理安全性策略。
Security policies, which we have improved in 1.1.
安全策略,这个在1.1里面有了改进。
Record of all security policies applied to all objects.
应用于所有对象的所有安全性策略的记录。
Decrypt the request if the security policies dictate it.
如果安全策略要求,则对请求进行解密。
Encrypt the request if the security policies dictate it.
如果安全策略要求,则对请求进行加密。
Run-time integrity check by configuring security policies.
通过配置安全策略来执行运行时完整性检查。
The use of security policies is a fundamental concept in the design.
安全策略的使用是设计中的基础概念。
The table here lists the security policies for the security group default.
这里的表格列示了安全组 default 的安全策略。
Security policies fall into three types: built-in, customized and high-level.
安全策略分为三类:内置、自定义和高级策略。
Access control. Enables the system to recognize security policies for groups of users.
访问控制—使系统能够识别用户组的安全性策略。
Local security policies can help to protect your machines against local account usage.
本地安全策略可帮助你在使用本地账号的情况下保护机器。
Security label components are the building blocks for security policies and labels.
安全标签组件是用于安全策略和安全标签的构建块。
The database security administrator configures the LBAC system by creating security policies.
数据库安全管理员通过创建安全策略来配置LBAC系统。
However, as more security is needed, new security policies can be created to restrict viewing.
然而,随着安全需求的增加,就会创建新安全策略来限制查看。
Centralizing the implementation of security policies, log analysis and reporting is a good thing.
安全策略、日志分析与报告的中心化实现是个不错的主义。
As shown in Figure 6, the core layer starts with security policies and procedures as a foundation.
如图6中所示,核心层以安全策略和过程作为基础。
As part of assigning a risk level, you have to consider the security policies assigned to the data.
作为分配风险等级的一部分,必须考虑分配给数据的安全性策略。
Along with this database, the te implements security policies that add another level to system security.
除了这个数据库以外,TE还实现了安全策略,从而增添了另一个级别的系统安全性。
Next, measure the level of business risk associated with your assets according to your security policies.
接下来,根据您的安全策略,度量与您的资产相关的业务风险级别。
Instead your time can be dedicated to designing security policies, category trees, and the system labels.
相反,你的时间可以用来设计安全策略,目录树,以及系统标签。
For one model, you may wish to have security policies and controls built upon the foundation of technologies.
对于一个模型,您可能会希望以技术为基础构建安全策略和控制。
If access to projects is a concern, then you can create security policies that control access to certain groups.
如果对项目的访问是您所关注的,那么您应该创建一个安全策略来控制一定的组能够访问项目。
Users are granted access to projects through Security policies, and their actions are defined by their Role.
通过安全策略,用户被授权访问项目,他们的活动是通过他们的角色定义的。
Additional factors that can complicate the deployment of tools are the company's network structure and security policies.
其他的可能使得工具部署复杂化的因素是公司的网络结构及安全规则。
These security policies are defined using the master data in the system. The policies require no customer development.
使用系统中的元数据定义这些安全策略,客户不需要开发它们。
The ultimate success of Mr Uribe’s tough security policies depends on them being continued by others—and on being adjusted.
乌里韦牢固的安全政策的最后的成功取决于其他人的继续进行并不断校正。
The scope of the policy covers privacy policies and rules, security policies and rules, transactional and enforcement rules.
这个策略的范围包括了隐私策略和规则,安全性策略和规则、交易和实施规则。