Security policies for administrators

Administrators need to adhere to the following policies in order to securely manage the machine:

  • The administrator should place the machine in a secure place where the machine can be protected by the physical contact or modulation,

  • The administrator should be fully aware of the security policies the organization has and follow them to manage the machine.

  • The administrator should give the right to use the machine to users according to the security policies and procedures.

  • The administrator should not use the authority one has over the machine with ill intention.

  • The administrator should manage the machine in a trusted network supported environment.

  • The administrator should guarantee that the certifying service via certification server is through a safe channel and is safely managed.

  • The administrator should provide a Time Stamp feature to keep an accurate system log history.

  • The administrator should provide a safe secure network channel with SSL.

  • The administrator should save the system log files exported by the Exporting feature in a safe place and protected.

  • The administrator should protect the machine from any unauthorized contact with external interfaces.