{"id":219,"date":"2024-03-20T09:54:37","date_gmt":"2024-03-20T13:54:37","guid":{"rendered":"https:\/\/home.hamptonu.edu\/iac\/?page_id=219"},"modified":"2024-08-21T12:13:01","modified_gmt":"2024-08-21T16:13:01","slug":"security-policy","status":"publish","type":"page","link":"https:\/\/home.hamptonu.edu\/iac\/security-policy\/","title":{"rendered":"Security Policy"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"219\" class=\"elementor elementor-219\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6b6ba02 e-flex e-con-boxed e-con e-parent\" data-id=\"6b6ba02\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-30892bc elementor-widget elementor-widget-text-editor\" data-id=\"30892bc\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h1 class=\"pagetitle\">Security Policy<\/h1>\n<h3>Security Policy Administration<\/h3>\n<ul>\n<li><strong>Security Policy Best Practices<\/strong>&nbsp;&#8211;&nbsp;The .NET Framework provides a code access security model that allows administrators to modify security policy to meet their individual needs. While code access security generally increases the reliability and security of applications, improperly administering code access security policy can potentially create security weaknesses. This section explains basic administration concepts and describes some of the best practices to use when administering code access security policy.<\/li>\n<\/ul>\n<h3>Security Policy Management<\/h3>\n<ul>\n<li><strong>Security Policy Management<\/strong>&nbsp;&#8211;&nbsp;&nbsp;Security policy is the configurable set of rules that the common language runtime follows when determining the permissions to grant to code. The code is identified by its assembly file, which is either an executable (.exe) or a library (.dll). The runtime examines identifiable characteristics of the assembly, such as the Web site or zone where the code originates, to determine the access that the code can have to resources.&nbsp;<\/li>\n<\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Security Policy Security Policy Administration Security Policy Best Practices&nbsp;&#8211;&nbsp;The .NET Framework provides a code access security model that allows administrators to modify security policy to meet their individual needs. While code access security generally increases the reliability and security of applications, improperly administering code access security policy can potentially create security weaknesses. This section explains [&hellip;]<\/p>\n","protected":false},"author":147,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"site-sidebar-layout":"no-sidebar","site-content-layout":"","ast-site-content-layout":"full-width-container","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"disabled","ast-breadcrumbs-content":"","ast-featured-img":"disabled","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"class_list":["post-219","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Security Policy - Information Assurance Center<\/title>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Security Policy - Information Assurance Center\" \/>\n<meta property=\"og:description\" content=\"Security Policy Security Policy Administration Security Policy Best Practices&nbsp;&#8211;&nbsp;The .NET Framework provides a code access security model that allows administrators to modify security policy to meet their individual needs. While code access security generally increases the reliability and security of applications, improperly administering code access security policy can potentially create security weaknesses. This section explains [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/home.hamptonu.edu\/iac\/security-policy\/\" \/>\n<meta property=\"og:site_name\" content=\"Information Assurance Center\" \/>\n<meta property=\"article:modified_time\" content=\"2024-08-21T16:13:01+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/home.hamptonu.edu\\\/iac\\\/security-policy\\\/\",\"url\":\"https:\\\/\\\/home.hamptonu.edu\\\/iac\\\/security-policy\\\/\",\"name\":\"Security Policy - Information Assurance Center\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/home.hamptonu.edu\\\/iac\\\/#website\"},\"datePublished\":\"2024-03-20T13:54:37+00:00\",\"dateModified\":\"2024-08-21T16:13:01+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/home.hamptonu.edu\\\/iac\\\/security-policy\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/home.hamptonu.edu\\\/iac\\\/security-policy\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/home.hamptonu.edu\\\/iac\\\/security-policy\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/home.hamptonu.edu\\\/iac\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security Policy\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/home.hamptonu.edu\\\/iac\\\/#website\",\"url\":\"https:\\\/\\\/home.hamptonu.edu\\\/iac\\\/\",\"name\":\"Information Assurance Center\",\"description\":\"At the HU School of Science\",\"publisher\":{\"@id\":\"https:\\\/\\\/home.hamptonu.edu\\\/iac\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/home.hamptonu.edu\\\/iac\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/home.hamptonu.edu\\\/iac\\\/#organization\",\"name\":\"Information Assurance Center\",\"url\":\"https:\\\/\\\/home.hamptonu.edu\\\/iac\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/home.hamptonu.edu\\\/iac\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/home.hamptonu.edu\\\/iac\\\/wp-content\\\/uploads\\\/sites\\\/105\\\/2026\\\/03\\\/HU_logo_white_227x113.png\",\"contentUrl\":\"https:\\\/\\\/home.hamptonu.edu\\\/iac\\\/wp-content\\\/uploads\\\/sites\\\/105\\\/2026\\\/03\\\/HU_logo_white_227x113.png\",\"width\":227,\"height\":113,\"caption\":\"Information Assurance Center\"},\"image\":{\"@id\":\"https:\\\/\\\/home.hamptonu.edu\\\/iac\\\/#\\\/schema\\\/logo\\\/image\\\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Security Policy - Information Assurance Center","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"Security Policy - Information Assurance Center","og_description":"Security Policy Security Policy Administration Security Policy Best Practices&nbsp;&#8211;&nbsp;The .NET Framework provides a code access security model that allows administrators to modify security policy to meet their individual needs. While code access security generally increases the reliability and security of applications, improperly administering code access security policy can potentially create security weaknesses. This section explains [&hellip;]","og_url":"https:\/\/home.hamptonu.edu\/iac\/security-policy\/","og_site_name":"Information Assurance Center","article_modified_time":"2024-08-21T16:13:01+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/home.hamptonu.edu\/iac\/security-policy\/","url":"https:\/\/home.hamptonu.edu\/iac\/security-policy\/","name":"Security Policy - Information Assurance Center","isPartOf":{"@id":"https:\/\/home.hamptonu.edu\/iac\/#website"},"datePublished":"2024-03-20T13:54:37+00:00","dateModified":"2024-08-21T16:13:01+00:00","breadcrumb":{"@id":"https:\/\/home.hamptonu.edu\/iac\/security-policy\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/home.hamptonu.edu\/iac\/security-policy\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/home.hamptonu.edu\/iac\/security-policy\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/home.hamptonu.edu\/iac\/"},{"@type":"ListItem","position":2,"name":"Security Policy"}]},{"@type":"WebSite","@id":"https:\/\/home.hamptonu.edu\/iac\/#website","url":"https:\/\/home.hamptonu.edu\/iac\/","name":"Information Assurance Center","description":"At the HU School of Science","publisher":{"@id":"https:\/\/home.hamptonu.edu\/iac\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/home.hamptonu.edu\/iac\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/home.hamptonu.edu\/iac\/#organization","name":"Information Assurance Center","url":"https:\/\/home.hamptonu.edu\/iac\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/home.hamptonu.edu\/iac\/#\/schema\/logo\/image\/","url":"https:\/\/home.hamptonu.edu\/iac\/wp-content\/uploads\/sites\/105\/2026\/03\/HU_logo_white_227x113.png","contentUrl":"https:\/\/home.hamptonu.edu\/iac\/wp-content\/uploads\/sites\/105\/2026\/03\/HU_logo_white_227x113.png","width":227,"height":113,"caption":"Information Assurance Center"},"image":{"@id":"https:\/\/home.hamptonu.edu\/iac\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/home.hamptonu.edu\/iac\/wp-json\/wp\/v2\/pages\/219","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/home.hamptonu.edu\/iac\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/home.hamptonu.edu\/iac\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/home.hamptonu.edu\/iac\/wp-json\/wp\/v2\/users\/147"}],"replies":[{"embeddable":true,"href":"https:\/\/home.hamptonu.edu\/iac\/wp-json\/wp\/v2\/comments?post=219"}],"version-history":[{"count":10,"href":"https:\/\/home.hamptonu.edu\/iac\/wp-json\/wp\/v2\/pages\/219\/revisions"}],"predecessor-version":[{"id":335,"href":"https:\/\/home.hamptonu.edu\/iac\/wp-json\/wp\/v2\/pages\/219\/revisions\/335"}],"wp:attachment":[{"href":"https:\/\/home.hamptonu.edu\/iac\/wp-json\/wp\/v2\/media?parent=219"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}