Skip to content
Open
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
2 changes: 1 addition & 1 deletion model-contract.md
Original file line number Diff line number Diff line change
Expand Up @@ -81,7 +81,7 @@ suspicious or malicious activity within Supplier’s production and corporate en

### 2.6. Scanning.
Supplier will run regular automated scans against their internet facing perimeter, production perimeter,
and internal network. Supplier will promptly fix high and critical severity findings.
and internal network.

### 2.7. Environment Separation and Access.
Supplier will maintain a boundary between its corporate and production
Expand Down