Security Appendix: Difference between revisions
Jump to navigation
Jump to search
Line 18: | Line 18: | ||
== Employee access control measures to the information system (authentication using identifiers, strong passwords)== | == Employee access control measures to the information system (authentication using identifiers, strong passwords)== | ||
Security Training Awareness | [https://docs.google.com/presentation/d/1tLhfFzQ3F5JRhsA5mton-Pb_dR75tIQTxtCv9t2SgLM/edit Security Training Awareness] | ||
[https://drive.google.com/open?id=11RM-CoDgTPcn6zxtaAF_H-suDVQK9O6U6veJh7WY1es Access control policy] | |||
[https://docs.google.com/document/d/1ipbV1zPnUtkQxCJl4bjtQLeFvnwPAvoTPuKrj5Arzts/edit?usp=sharing Remote access policy] | |||
[https://docs.google.com/document/d/1rXlOsyFSbtK4IVAQWdpBwRTw-FtWtpbdg2RcW55ouvA/edit?usp=sharing password policy] | |||
== Traceability of connections and actions== | == Traceability of connections and actions== |