EN The inherited controls within the template are prepopulated by AWS; shared controls are the responsibility of both AWS and the customer; and some controls are fully the responsibility of the customer.
"physical security controls" em inglês pode ser traduzido nas seguintes palavras/frases indonésio:
EN The inherited controls within the template are prepopulated by AWS; shared controls are the responsibility of both AWS and the customer; and some controls are fully the responsibility of the customer.
ID Kontrol yang diwariskan dalam template sudah diisi sebelumnya oleh AWS; kontrol bersama adalah tanggung jawab AWS dan pelanggan; dan beberapa kontrol sepenuhnya merupakan tanggung jawab pelanggan.
inglês | indonésio |
---|---|
controls | kontrol |
template | template |
aws | aws |
responsibility | tanggung jawab |
fully | sepenuhnya |
customer | pelanggan |
within | dalam |
the | dan |
some | beberapa |
EN No. The AWS Attestation of Compliance (AOC) demonstrates an extensive assessment of physical security controls of AWS data centers. It is not necessary for a merchant’s QSA to verify the security of the AWS data centers.
ID Pengesahan Kepatuhan (AOC) AWS menunjukkan penilaian ekstensif untuk kontrol keamanan fisik dari pusat data AWS. QSA merchant tidak perlu memverifikasi keamanan pusat data AWS.
inglês | indonésio |
---|---|
aws | aws |
compliance | kepatuhan |
assessment | penilaian |
physical | fisik |
security | keamanan |
controls | kontrol |
data | data |
centers | pusat |
verify | memverifikasi |
not | tidak |
to | untuk |
EN A description of the AWS controls environment and external audit of AWS controls that meet the AICPA Trust Services Security, Availability, and Confidentiality Principles and Criteria
ID Deskripsi tentang lingkungan kontrol AWS dan audit eksternal dari kontrol AWS yang memenuhi Prinsip dan Kriteria Keamanan, Ketersediaan, dan Kerahasiaan AICPA Trust Services
inglês | indonésio |
---|---|
description | deskripsi |
aws | aws |
controls | kontrol |
environment | lingkungan |
external | eksternal |
audit | audit |
meet | memenuhi |
availability | ketersediaan |
principles | prinsip |
criteria | kriteria |
security | keamanan |
confidentiality | kerahasiaan |
the | dan |
EN ISO/IEC 27001:2013 is a security management standard that specifies security management best practices and comprehensive security controls following the ISO/IEC 27002 best practice guidance
ID ISO/IEC 27001:2013 adalah standar manajemen keamanan yang menentukan praktik terbaik manajemen keamanan dan kontrol keamanan komprehensif mengikuti panduan praktik terbaik ISO/IEC 27002
inglês | indonésio |
---|---|
iso | iso |
security | keamanan |
standard | standar |
best | terbaik |
comprehensive | komprehensif |
guidance | panduan |
management | manajemen |
controls | kontrol |
practices | praktik |
following | mengikuti |
is | adalah |
the | dan |
EN AWS System and Organization Controls (SOC) Reports are independent third-party examination reports that demonstrate how AWS achieves key compliance controls and objectives
ID Laporan System and Organization Controls (SOC) AWS adalah laporan pemeriksaan pihak ketiga independen yang menunjukkan cara AWS mencapai kontrol dan sasaran kepatuhan utama
inglês | indonésio |
---|---|
aws | aws |
controls | kontrol |
soc | soc |
reports | laporan |
key | utama |
compliance | kepatuhan |
and | dan |
third-party | pihak ketiga |
third | ketiga |
are | adalah |
that | yang |
EN A description of the AWS controls environment and external audit of AWS controls that meet the AICPA Trust Services Privacy Principle and Criteria
ID Deskripsi tentang lingkungan kontrol AWS dan audit eksternal dari kontrol AWS yang memenuhi Prinsip dan Kriteria Keamanan, Ketersediaan, dan Kerahasiaan AICPA Trust Services
inglês | indonésio |
---|---|
description | deskripsi |
aws | aws |
controls | kontrol |
environment | lingkungan |
external | eksternal |
audit | audit |
meet | memenuhi |
criteria | kriteria |
privacy | keamanan |
the | dan |
EN While this solution implements many of the controls that are outlined in the IRAP PROTECTED Reference Architecture, not all of the recommended controls are included in this Quick Start
ID Meskipun solusi ini mengimplementasikan sebagian besar kontrol yang diuraikan dalam Arsitektur Referensi DILINDUNGI IRAP, tidak semua rekomendasi kontrol disertakan dalam Panduan Ringkas ini
inglês | indonésio |
---|---|
solution | solusi |
controls | kontrol |
reference | referensi |
architecture | arsitektur |
protected | dilindungi |
in | dalam |
all | semua |
the | yang |
not | tidak |
this | ini |
EN These are the fastest time controls and are the second most popular time controls on Chess.com with almost a million bullet games played per day
ID Ini adalah kontrol waktu tercepat dan kontrol waktu terpopuler kedua di Chess.com dengan hampir satu juta permainan catur peluru dimainkan per hari
inglês | indonésio |
---|---|
fastest | tercepat |
controls | kontrol |
almost | hampir |
million | juta |
games | permainan |
time | waktu |
per | per |
second | kedua |
the | dan |
day | hari |
EN We design and implement a comprehensive suite of information security controls and other forms of risk management to address customer and architecture security risks.
ID Kami mendesain dan menerapkan rangkaian kontrol keamanan informasi komprehensif dan bentuk manajemen risiko lainnya untuk mengatasi risiko keamanan pelanggan dan arsitektur.
inglês | indonésio |
---|---|
implement | menerapkan |
comprehensive | komprehensif |
information | informasi |
security | keamanan |
forms | bentuk |
customer | pelanggan |
controls | kontrol |
management | manajemen |
other | lainnya |
risk | risiko |
we | kami |
architecture | arsitektur |
to | untuk |
and | dan |
EN Properly securing Criminal Justice Information (CJI) and maintaining compliance with the CJIS Security Policy requires a number of security controls aimed at ensuring only authorized individuals have access to the CJI
ID Mengamankan Criminal Justice Information (CJI) dengan tepat dan mengelola kepatuhan dengan Kebijakan Keamanan CJIS memerlukan sejumlah kontrol keamanan yang bertujuan untuk memastikan hanya individu yang berwenanglah yang memiliki akses ke CJI
inglês | indonésio |
---|---|
securing | mengamankan |
compliance | kepatuhan |
policy | kebijakan |
controls | kontrol |
individuals | individu |
access | akses |
security | keamanan |
to | ke |
ensuring | memastikan |
and | tepat |
the | dan |
have | memiliki |
EN When operating an application in AWS, in the spirit of shared security responsibility, the DoD mission owner is responsible for a reduced baseline of security controls
ID Saat mengoperasikan aplikasi di AWS, dengan semangat tanggung jawab keamanan bersama, pemilik misi DoD bertanggung jawab atas baseline kontrol keamanan yang dikurangi
inglês | indonésio |
---|---|
application | aplikasi |
aws | aws |
security | keamanan |
dod | dod |
mission | misi |
owner | pemilik |
controls | kontrol |
responsible | bertanggung jawab |
in | di |
when | saat |
the | yang |
responsibility | tanggung jawab |
of | atas |
EN To receive re-authorization of a FedRAMP authorization from year to year, CSPs must monitor their security controls, assess them on a regular basis, and demonstrate that the security posture of their service offering is continuously acceptable
ID Guna mendapatkan otorisasi ulang dari otorisasi FedRAMP dari tahun ke tahun, CSP harus memantau kontrol keamanan mereka, menilai kontrol keamanan secara berkala, dan menunjukkan bahwa postur keamanan penawaran layanan mereka dapat terus diterima
inglês | indonésio |
---|---|
fedramp | fedramp |
authorization | otorisasi |
year | tahun |
monitor | memantau |
security | keamanan |
controls | kontrol |
service | layanan |
re | ulang |
to | ke |
the | dan |
must | harus |
is | mendapatkan |
EN Design and implement a comprehensive suite of information security controls and other forms of risk management to address company and architecture security risks;
ID Merancang dan menerapkan serangkaian kontrol keamanan informasi yang komprehensif dan bentuk-bentuk manajemen risiko untuk mengatasi risiko keamanan perusahaan dan arsitektur;
inglês | indonésio |
---|---|
implement | menerapkan |
comprehensive | komprehensif |
information | informasi |
security | keamanan |
forms | bentuk |
controls | kontrol |
management | manajemen |
company | perusahaan |
risk | risiko |
architecture | arsitektur |
to | untuk |
and | dan |
EN Adopt an overarching management process to ensure that the information security controls meet our information security needs on an ongoing basis.
ID Mengadopsi proses manajemen menyeluruh untuk memastikan bahwa kontrol keamanan informasi memenuhi kebutuhan keamanan informasi kami secara berkelanjutan.
inglês | indonésio |
---|---|
process | proses |
meet | memenuhi |
needs | kebutuhan |
management | manajemen |
information | informasi |
controls | kontrol |
security | keamanan |
our | kami |
ensure | memastikan |
to | untuk |
EN It is recommended that any assessment clearly addresses the security controls in the ISM, and ASD cloud security guidance, including:
ID Disarankan bahwa penilaian apa pun harus jelas membahas kontrol keamanan dalam ISM, dan panduan keamanan cloud ASD, termasuk:
inglês | indonésio |
---|---|
recommended | disarankan |
assessment | penilaian |
clearly | jelas |
security | keamanan |
controls | kontrol |
guidance | panduan |
including | termasuk |
in | dalam |
the | dan |
EN The AWS data center security strategy is assembled with scalable security controls and multiple layers of defense that help to protect your information
ID Strategi keamanan pusat data AWS tersusun oleh kontrol keamanan yang dapat diatur skalanya, dan berbagai lapisan pertahanan yang membantu melindungi informasi Anda
inglês | indonésio |
---|---|
aws | aws |
center | pusat |
strategy | strategi |
controls | kontrol |
multiple | berbagai |
help | membantu |
data | data |
information | informasi |
security | keamanan |
protect | melindungi |
the | dan |
EN International Traffic in Arms Regulations (ITAR) controls the export from the US of defense-related articles, and the regulations state that no non-US person can have physical or logical access to the articles stored in the ITAR environment.
ID International Traffic in Arms Regulations (ITAR) mengendalikan ekspor barang terkait pertahanan dari AS, dan regulasi menyatakan bahwa warga negara non-AS dapat memiliki akses secara fisik atau logis ke barang yang disimpan dalam lingkungan ITAR.
inglês | indonésio |
---|---|
regulations | regulasi |
state | negara |
physical | fisik |
logical | logis |
access | akses |
stored | disimpan |
environment | lingkungan |
related | terkait |
can | dapat |
or | atau |
to | ke |
in | dalam |
the | dan |
have | memiliki |
EN International Traffic in Arms Regulations (ITAR) controls the export from the US of defense-related articles, and the regulations state that no non-US person can have physical or logical access to the articles stored in the ITAR environment.
ID International Traffic in Arms Regulations (ITAR) mengendalikan ekspor barang terkait pertahanan dari AS, dan regulasi menyatakan bahwa warga negara non-AS dapat memiliki akses secara fisik atau logis ke barang yang disimpan dalam lingkungan ITAR.
inglês | indonésio |
---|---|
regulations | regulasi |
state | negara |
physical | fisik |
logical | logis |
access | akses |
stored | disimpan |
environment | lingkungan |
related | terkait |
can | dapat |
or | atau |
to | ke |
in | dalam |
the | dan |
have | memiliki |
EN Securing Physical Access Controls
ID Mengamankan Kontrol Akses Fisik
inglês | indonésio |
---|---|
securing | mengamankan |
physical | fisik |
access | akses |
controls | kontrol |
EN Families should consider using a family security app with parental controls to track activity.
ID Keluarga sebaiknya mempertimbangkan penggunaan aplikasi keamanan keluarga dengan parental control untuk melacak aktivitas.
inglês | indonésio |
---|---|
should | sebaiknya |
consider | mempertimbangkan |
security | keamanan |
track | melacak |
activity | aktivitas |
family | keluarga |
app | aplikasi |
using | penggunaan |
to | untuk |
with | dengan |
EN Finally, family security apps like Bark, use parental controls to block teens from using Reddit until they?re ready or restrict teens from using the internet within certain times
ID Terakhir, aplikasi keamanan keluarga seperti Bark, menggunakan parental control untuk memblokir anak remaja supaya tidak menggunakan Reddit sampai mereka sudah siap atau membatasi anak remaja supaya menggunakan internet selama batas waktu tertentu
inglês | indonésio |
---|---|
finally | terakhir |
family | keluarga |
security | keamanan |
block | memblokir |
teens | remaja |
ready | siap |
restrict | membatasi |
internet | internet |
times | waktu |
or | atau |
certain | tertentu |
like | seperti |
to | sampai |
EN Once the connection is established, data traffic takes place without restrictions and controls (since TCP and UDP already have network security measures)
ID Setelah koneksi dibuat, traffic data terjadi tanpa batasan atau pengaturan (karena TCP dan UDP sudah memiliki upaya jaringan keamanan)
inglês | indonésio |
---|---|
data | data |
without | tanpa |
restrictions | batasan |
tcp | tcp |
network | jaringan |
security | keamanan |
connection | koneksi |
since | karena |
once | setelah |
the | dan |
have | memiliki |
EN The AWS Compliance Program helps customers to understand the robust controls in place at AWS to maintain security and compliance in the cloud
ID Program Kepatuhan AWS membantu pelanggan memahami kontrol kuat yang ada di AWS untuk menjaga keamanan dan kepatuhan di cloud
inglês | indonésio |
---|---|
compliance | kepatuhan |
program | program |
helps | membantu |
customers | pelanggan |
robust | kuat |
controls | kontrol |
security | keamanan |
in | di |
aws | aws |
maintain | menjaga |
the | dan |
to | untuk |
EN We have an overarching management process to ensure that the information security controls meet our needs on an ongoing basis.
ID Kami mengadopsi proses manajemen menyeluruh untuk memastikan bahwa kontrol keamanan informasi memenuhi kebutuhan kami secara berkelanjutan.
inglês | indonésio |
---|---|
process | proses |
meet | memenuhi |
needs | kebutuhan |
management | manajemen |
information | informasi |
controls | kontrol |
security | keamanan |
ensure | memastikan |
to | untuk |
EN The AWS SOC 3 report outlines how AWS meets the AICPA’s Trust Security Principles in SOC 2 and includes the external auditor’s opinion of the operation of controls
ID Laporan SOC 3 AWS menekankan cara AWS memenuhi Trust Security Principles AICPA di SOC 2 dan menyertakan opini auditor eksternal tentang operasi kontrol
inglês | indonésio |
---|---|
aws | aws |
soc | soc |
report | laporan |
meets | memenuhi |
external | eksternal |
auditors | auditor |
operation | operasi |
controls | kontrol |
of the | cara |
in | di |
the | dan |
EN AWS has effectively implemented security management processes, PCI DSS requirements, and other compensating controls that effectively and securely segregate each customer into its own protected environment
ID AWS telah menerapkan proses manajemen keamanan, persyaratan PCI DSS, dan kontrol pelengkap lainnya yang secara efektif dan aman memisahkan setiap pelanggan ke dalam lingkungannya sendiri yang terlindungi
inglês | indonésio |
---|---|
aws | aws |
processes | proses |
pci | pci |
dss | dss |
requirements | persyaratan |
customer | pelanggan |
security | keamanan |
management | manajemen |
controls | kontrol |
securely | aman |
other | lainnya |
protected | terlindungi |
and | dan |
each | setiap |
effectively | efektif |
its | yang |
into | ke |
own | sendiri |
EN Enforce strict security controls on your Lambda function runtime
ID Tegakkan kontrol keamanan ketat pada waktu aktif fungsi Lambda Anda
inglês | indonésio |
---|---|
strict | ketat |
security | keamanan |
controls | kontrol |
on | pada |
your | anda |
lambda | lambda |
function | fungsi |
EN The CJIS Security Policy outlines the “appropriate controls to protect the full lifecycle of CJI (Criminal Justice Information), whether at rest or in transit,” irrespective of the underlying information technology model
ID Kebijakan Keamanan CJIS menguraikan “kontrol yang tepat untuk melindungi siklus hidup penuh CJI (Criminal Justice Information), baik saat istirahat maupun saat transit,” terlepas dari mode teknologi informasi mendasarnya
EN As a DoD mission owner, you are responsible for building an authorization package that fully defines your implementation of the security controls applicable to your application
ID Sebagai pemilik misi DoD, Anda bertanggung jawab untuk membuat paket otorisasi yang sepenuhnya menentukan penerapan kontrol keamanan yang berlaku untuk aplikasi Anda
inglês | indonésio |
---|---|
dod | dod |
mission | misi |
owner | pemilik |
responsible | bertanggung jawab |
authorization | otorisasi |
package | paket |
fully | sepenuhnya |
security | keamanan |
controls | kontrol |
applicable | berlaku |
application | aplikasi |
as | sebagai |
the | yang |
to | untuk |
EN For more information about security controls and risk acceptance considerations, please contact AWS Compliance.
ID Untuk informasi lebih lanjut tentang kontrol keamanan dan pertimbangan penerimaan risiko, hubungi AWS Compliance.
inglês | indonésio |
---|---|
information | informasi |
security | keamanan |
controls | kontrol |
risk | risiko |
contact | hubungi |
aws | aws |
and | dan |
about | tentang |
more | lebih |
EN For these agencies to rely upon the security of the CSP, FedRAMP is a compliance program that is built on a baseline of NIST SP 800-53 controls to comply with FISMA requirements within the cloud.
ID Untuk lembaga-lembaga yang akan mengandalkan keamanan CSP ini, FedRAMP adalah program kepatuhan yang dibangun pada baseline kontrol NIST SP 800-53 untuk mematuhi persyaratan FISMA di dalam cloud.
inglês | indonésio |
---|---|
agencies | lembaga |
rely | mengandalkan |
security | keamanan |
fedramp | fedramp |
compliance | kepatuhan |
program | program |
built | dibangun |
controls | kontrol |
requirements | persyaratan |
is | adalah |
comply | mematuhi |
within | di |
to | untuk |
EN The assessment examined the security controls of Amazon’s people, process, and technology
ID Penilaian tersebut menguji keamanan kontrol orang, proses, dan teknologi Amazon
inglês | indonésio |
---|---|
assessment | penilaian |
security | keamanan |
controls | kontrol |
people | orang |
process | proses |
technology | teknologi |
the | dan |
EN The C5 attestation can be used by AWS customers and their compliance advisors to understand security controls implemented by AWS to meet the C5 requirements as they move their workloads to the cloud
ID Pengesahan C5 dapat digunakan oleh pelanggan AWS dan penasihat kepatuhan mereka untuk memahami kontrol layanan yang diterapkan oleh AWS guna memenuhi persyaratan C5 saat mereka memindahkan beban kerja mereka ke cloud
inglês | indonésio |
---|---|
used | digunakan |
customers | pelanggan |
compliance | kepatuhan |
controls | kontrol |
meet | memenuhi |
requirements | persyaratan |
workloads | beban kerja |
aws | aws |
to | ke |
can | dapat |
move | memindahkan |
the | dan |
by | oleh |
as | saat |
EN C5 adds the regulatory defined IT-Security level equivalent to the IT-Grundschutz with the addition of cloud specific controls.
ID C5 menambahkan tingkat Keamanan IT yang ditentukan undang-undang setara dengan IT-Grundschutz dengan tambahan kontrol khusus cloud.
inglês | indonésio |
---|---|
adds | menambahkan |
level | tingkat |
specific | khusus |
controls | kontrol |
security | keamanan |
the | yang |
EN Yes, AWS together with the National Cryptologic Centre have created a set of guidelines that customers can use to align with the security controls described in the High category of the ENS
ID Ya, AWS bersama dengan National Cryptologic Center telah membuat serangkaian pedoman yang dapat digunakan pelanggan untuk menyelaraskan dengan kontrol keamanan yang dijelaskan dalam kategori Tinggi ENS
inglês | indonésio |
---|---|
aws | aws |
guidelines | pedoman |
customers | pelanggan |
security | keamanan |
controls | kontrol |
described | dijelaskan |
category | kategori |
can | dapat |
use | digunakan |
yes | ya |
high | tinggi |
in | dalam |
the | yang |
EN The following links indicate the 800 CCN STIC guidelines and tools that maybe used to align with the security controls described in the ENS.
ID Tautan berikut menunjukkan pedoman 800 CCN STIC dan alat yang mungkin digunakan untuk menyelaraskan dengan kontrol keamanan yang dijelaskan dalam ENS.
inglês | indonésio |
---|---|
links | tautan |
guidelines | pedoman |
tools | alat |
security | keamanan |
controls | kontrol |
described | dijelaskan |
used | digunakan |
in | dalam |
following | berikut |
the | dan |
to | untuk |
EN It is based on ISO information security standard 27002 and provides implementation guidance on ISO 27002 controls applicable to Personally Identifiable Information (PII) processed by public cloud service providers
ID Ini didasarkan pada standar keamanan informasi ISO 27002 dan memberikan panduan implementasi terkait kontrol ISO 27002 yang berlaku untuk Personally Identifiable Information (PII) yang diproses oleh penyedia layanan cloud publik
inglês | indonésio |
---|---|
iso | iso |
information | informasi |
standard | standar |
guidance | panduan |
controls | kontrol |
public | publik |
security | keamanan |
applicable | berlaku |
service | layanan |
providers | penyedia |
and | dan |
to | untuk |
by | oleh |
is | yang |
provides | ini |
EN Customers can build on the technical and organizational security measures and controls offered by AWS to manage their own compliance requirements
ID Pelanggan dapat membangun langkah dan kontrol keamanan teknis dan organisasional yang ditawarkan oleh AWS untuk mengelola persyaratan kepatuhannya sendiri
inglês | indonésio |
---|---|
customers | pelanggan |
can | dapat |
build | membangun |
technical | teknis |
measures | langkah |
controls | kontrol |
offered | ditawarkan |
aws | aws |
requirements | persyaratan |
security | keamanan |
the | dan |
to | untuk |
by | oleh |
own | sendiri |
EN Under the AWS Shared Responsibility Model, customers can build on the technical and organizational security measures and controls offered by AWS to manage their own compliance requirements
ID Dalam Model Tanggung Jawab Bersama AWS, pelanggan dapat membuat kontrol dan langkah-langkah keamanan teknis dan organisasional yang ditawarkan oleh AWS untuk mengelola persyaratan kepatuhan mereka sendiri
inglês | indonésio |
---|---|
aws | aws |
responsibility | tanggung jawab |
model | model |
customers | pelanggan |
technical | teknis |
measures | langkah |
controls | kontrol |
offered | ditawarkan |
compliance | kepatuhan |
requirements | persyaratan |
can | dapat |
security | keamanan |
to | bersama |
the | dan |
by | oleh |
on | dalam |
own | sendiri |
EN AWS makes available a wide range of materials to help customers understand the AWS environment and security controls
ID AWS menyediakan beragam materi untuk membantu pelanggan memahami lingkungan dan kontrol keamanan AWS
inglês | indonésio |
---|---|
aws | aws |
materials | materi |
customers | pelanggan |
environment | lingkungan |
security | keamanan |
controls | kontrol |
help | membantu |
the | dan |
to | untuk |
EN Registry of security and compliance controls for cloud service offerings
ID Registri kontrol keamanan dan kepatuhan untuk penawaran layanan cloud
inglês | indonésio |
---|---|
security | keamanan |
compliance | kepatuhan |
controls | kontrol |
service | layanan |
for | untuk |
and | dan |
EN Security controls assessment for Australian Government customers
ID Penilaian kontrol keamanan untuk pelanggan Pemerintah Australia
inglês | indonésio |
---|---|
security | keamanan |
controls | kontrol |
assessment | penilaian |
government | pemerintah |
customers | pelanggan |
for | untuk |
EN • Security measures that customers implement and operate, related to the security of their customer content and applications that make use of AWS services - "security in the cloud"
ID • Langkah-langkah keamanan yang diterapkan dan dioperasikan oleh pelanggan, terkait dengan keamanan konten dan aplikasi yang memanfaatkan layanan AWS – "keamanan di cloud"
EN The Multi-Tier Cloud Security (MTCS) is an operational Singapore security management Standard (SPRING SS 584), based on ISO 27001/02 Information Security Management System (ISMS) standards. The certification assessment requires us to:
ID Multi-Tier Cloud Security (MTCS) adalah Standar manajemen keamanan operasional di Singapura (SPRING SS 584), berdasarkan standar ISO 27001/02 Information Security Management System (ISMS). Penilaian sertifikasi mengharuskan kami untuk:
inglês | indonésio |
---|---|
security | keamanan |
mtcs | mtcs |
operational | operasional |
singapore | singapura |
management | manajemen |
iso | iso |
certification | sertifikasi |
assessment | penilaian |
is | adalah |
standard | standar |
on | berdasarkan |
to | untuk |
EN By implementing systematic and comprehensive information security measures instead of one-time adhoc information security measures, the level of information security management of enterprises and organizations may be improved
ID Dengan menerapkan langkah-langkah keamanan informasi yang sistematis dan komprehensif dan bukan langkah-langkah keamanan informasi adhoc satu kali, tingkat manajemen keamanan informasi perusahaan dan organisasi dapat ditingkatkan
inglês | indonésio |
---|---|
comprehensive | komprehensif |
information | informasi |
measures | langkah |
level | tingkat |
organizations | organisasi |
time | kali |
security | keamanan |
management | manajemen |
enterprises | perusahaan |
the | dan |
EN The same world-class security experts who monitor this infrastructure also build and maintain our broad selection of innovative security services, which can help you simplify meeting your own security and regulatory requirements
ID Pakar keamanan kelas dunia yang sama yang memantau infrastruktur ini juga membangun dan mengelola berbagai pilihan layanan keamanan inovatif kami, untuk membantu Anda menyederhanakan pemenuhan persyaratan keamanan dan regulasi Anda sendiri
inglês | indonésio |
---|---|
security | keamanan |
experts | pakar |
monitor | memantau |
build | membangun |
innovative | inovatif |
simplify | menyederhanakan |
requirements | persyaratan |
class | kelas |
infrastructure | infrastruktur |
selection | pilihan |
help | membantu |
services | layanan |
also | juga |
world | dunia |
same | sama |
own | sendiri |
the | dan |
this | ini |
EN Security measures that customers implement and operate, related to the security of their customer content and applications that make use of AWS services - "security in the cloud"
ID Langkah-langkah keamanan yang diterapkan dan dioperasikan oleh pelanggan, terkait dengan keamanan konten dan aplikasi pelanggan mereka yang memanfaatkan layanan AWS – "keamanan di cloud"
inglês | indonésio |
---|---|
security | keamanan |
measures | langkah |
related | terkait |
content | konten |
applications | aplikasi |
services | layanan |
in | di |
aws | aws |
and | dan |
their | mereka |
use | dengan |
customers | pelanggan |
EN We make sure that our security system meets standard world-class security practices which are also aligned with standard security practices of local banks, international gateways, and the local government.
ID Kami memastikan bahwa sistem keamanan kami memenuhi standar praktik keamanan kelas dunia yang juga disesuaikan dengan standar praktik keamanan bank lokal, gateway internasional, dan pemerintah lokal.
inglês | indonésio |
---|---|
system | sistem |
meets | memenuhi |
standard | standar |
practices | praktik |
banks | bank |
government | pemerintah |
class | kelas |
local | lokal |
security | keamanan |
international | internasional |
also | juga |
world | dunia |
the | dan |
EN Ready Honda recently migrated its physical servers into a virtual environment for extra flexibility, but the virtual machines lacked the level of data security the company required.
ID Ready Honda baru-baru ini telah memindahkan server fisiknya ke lingkungan virtual demi fleksibilitas lebih tinggi, tetapi mesin virtual tersebut tidak memiliki tingkat keamanan data memadai yang diperlukan oleh perusahaan.
inglês | indonésio |
---|---|
servers | server |
virtual | virtual |
environment | lingkungan |
flexibility | fleksibilitas |
machines | mesin |
data | data |
security | keamanan |
company | perusahaan |
but | tetapi |
level | tingkat |
required | diperlukan |
into | ke |
recently | baru-baru ini |
of | oleh |
EN 3.2 ZenVPN will maintain commercially reasonable administrative, physical and technical safeguards to protect the security, confidentiality and integrity of Your Data
ID 3.2 ZenVPN akan mempertahankan pengamanan administrasi, fisik dan teknis yang wajar secara komersial untuk melindungi keamanan, kerahasiaan dan integritas Data Anda
inglês | indonésio |
---|---|
maintain | mempertahankan |
reasonable | wajar |
physical | fisik |
technical | teknis |
integrity | integritas |
data | data |
security | keamanan |
confidentiality | kerahasiaan |
the | dan |
to | untuk |
protect | melindungi |
Mostrando 50 de 50 traduções