Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

3.3 Operating the Infrastructure

3.3.1    Regular safety precautions

Everyone is responsible for their own network. It is not in the scope for this document to describe regular network or system security measurements. Local "best current practices" for the network and system design should be followed in any case.

3.3.2    Tracking malicious users

If the requirements of the policy are followed, it should be possible to provide sufficient evidence to government agencies to allow them to pinpoint a malicious user, thereby protecting the service provider. The requirements are:

...