API THIRD PARTY NETWORK-2007 Standard for Third Party Network Connectivity《第三方网络连通性用标准》.pdf
《API THIRD PARTY NETWORK-2007 Standard for Third Party Network Connectivity《第三方网络连通性用标准》.pdf》由会员分享,可在线阅读,更多相关《API THIRD PARTY NETWORK-2007 Standard for Third Party Network Connectivity《第三方网络连通性用标准》.pdf(46页珍藏版)》请在麦多课文档分享上搜索。
1、Standard for Third Party Network ConnectivityNOVEMBER 2007Standard for Third Party Network ConnectivityCorporate Affairs DepartmentNOVEMBER 2007Special NotesAPI publications necessarily address problems of a general nature. With respect to particular circumstances, local, state, and federal laws and
2、 regulations should be reviewed.Neither API nor any of APIs employees, subcontractors, consultants, committees, or other assignees make any warranty or representation, either express or implied, with respect to the accuracy, completeness, or usefulness of the information contained herein, or assume
3、any liability or responsibility for any use, or the results of such use, of any information or process disclosed in this publication. Neither API nor any of APIs employees, subcontractors, consultants, or other assignees represent that use of this publication would not infringe upon privately owned
4、rights.Users of this recommended practice should not rely exclusively on the information contained in this document. Sound business, scientific, engineering, and safety judgement should be used in employing the information contained herein.API publications may be used by anyone desiring to do so. Ev
5、ery effort has been made by the Institute to assure the accuracy and reliability of the data contained in them; however, the Institute makes no representation, warranty, or guarantee in connection with this publication and hereby expressly disclaims any liability or responsibility for loss or damage
6、 resulting from its use or for the violation of any authorities having jurisdiction with which this publication may conflict.API publications are published to facilitate the broad availability of proven, sound engineering and operating practices. These publications are not intended to obviate the ne
7、ed for applying sound engineering judgment regarding when and where these publications should be utilized. The formulation and publication of API publications is not intended in any way to inhibit anyone from using any other practices.Any manufacturer marking equipment or materials in conformance wi
8、th the marking requirements of an API standard is solely responsible for complying with all the applicable requirements of that standard. API does not represent, warrant, or guarantee that such products do in fact conform to the applicable API standard.All rights reserved. No part of this work may b
9、e reproduced, stored in a retrieval system, or transmitted by any means, electronic, mechanical, photocopying, recording, or otherwise, without prior written permission from the publisher. Contact the Publisher, API Publishing Services, 1220 L Street, N.W., Washington, D.C. 20005.Copyright 2007 Amer
10、ican Petroleum InstituteForewordNothing contained in any API publication is to be construed as granting any right, by implication or otherwise, for the manufacture, sale, or use of any method, apparatus, or product covered by letters patent. Neither should anything contained in the publication be co
11、nstrued as insuring anyone against liability for infringement of letters patent.Suggested revisions are invited and should be submitted to the Director of Corporate Affairs, API, 1220 L Street, NW, Washington, DC 20005.iiiTable of Contents Standard.3 Trust. 4 1 Connection Request The Company creatin
12、g the connection(s) holds the liability; Connections can be terminated at any time. Security Plan An IT security plan should be an integral part of a companys overall security program. Each company considers to the extent possible its unique security risks and then assesses them to ensure the plan c
13、overs those risks. This standard recognizes the need for flexibility in the design of security plans and provides guidance for this need. Some of the security plan must remain confidential. A confidentiality program can ensure understanding of what information can be shared and what remains confiden
14、tial. The ISO/IEC International Standard 17799 describes a framework for the creation of an IT security plan. This framework has been endorsed by APIs Information Technology Security Forum as voluntary guidance to protect the oil and natural gas industry against acts of cyber terrorism. The standard
15、 attempts to ensure preservation of confidentiality, integrity, and availability of user access, hardware and software, and data. The standard involves eight steps in the security process: Create an information security policy; Select and implement appropriate controls; Obtain upper management suppo
16、rt; Perform security risk assessment; Create statement of applicability for all employees; Create information security management system; Educate and train staff; Audit. THIRD PARTY NETWORK CONNECTIVITY 5Information on how to obtain this standard is provided at: http:/webstore.ansi.org/. THIRD PARTY
17、 NETWORK CONNECTIVITY 61 Connection Request including two (2) technical contacts, area code/telephone number, pagers email address, and location address. Identify the Hosting Company organization name and network that you will be accessing, including a technical contact, area code/telephone number,
18、and location address. Indicate the type of connection requested either dial-up, dedicated private leased line or VPN (i.e. Site-to-Site VPN with DMZ, Traditional Site-to-Site VPN, or Site-to-Site VPN internal DMZ), see attachment 1Guidance for Use Document for details related to the type of VPN requ
19、ired. Indicate the date the connection is required. Indicate the date the connection is to be terminated. (Elevated access should be limited and reviewed under tighter controls) Provide a technical description of the project, including assessment of current security level of external party. Include
20、VISIO diagrams, risk assessment, and additional security controls that are to be implemented. Provide justification for the project, including alternatives considered. THIRD PARTY NETWORK CONNECTIVITY 91.4 API Third Party User Responsibility Sample Agreement This agreement sets forth s position conf
21、irming its right to protect property and that its contractors, consultants, and vendors hereafter referred to as “Trusted Third Party” properly uses such property. Obligations and conditions set forward in this statement shall be in addition to any obligations, conditions, or commitments contained i
22、n any agreement(s) under or through which Trusted Third Party users are providing services to . The purpose of this agreement is to ensure that all users use computing facilities in an effective, efficient, ethical and lawful manner. Property Defined property is defined as, but not limited to, the f
23、ollowing: a. All data, documents, correspondence, and intellectual property whether contained in electronic, physical, hard copy or other form, access cards, badges and keys to facilities, desks, and cabinets; b. Hardware, such as network resources including servers, PCs, workstations, networks, mon
24、itors, scanners, printers, telephones and voice mail, facsimile machines, cellular phones, pagers, secured id tokens, smart cards, and personal digital assistants; c. All User IDs, system/application/screensaver passwords, software, including all administrative office, e-mail, Internet, operating sy
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
5000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- APITHIRDPARTYNETWORK2007STANDARDFORTHIRDPARTYNETWORKCONNECTIVITY 第三 网络 连通性 标准 PDF

链接地址:http://www.mydoc123.com/p-430113.html