Not a Tech Pro Research member? Sign up for a Free Trial and get access to this content and more for one week.
Power checklist: Vetting employees for security sensitive operations
- Originally Published:
- May 2016
This checklist will help you find the safest route to governing appropriate access to sensitive data, apps, and processes. You can print the list or use it in electronic form.
Already a member? Log in here