SecAware materials

A 3½-page generic information security policy about the privileges needed to install, use and manage IT systems.

 

Controlling access to and use of privileged user identities is fundamental for IT systems security since most other technical system security controls can be overridden or disabled by privileged users.  This policy explains how privileges are controlled according to the information risks associated with various IT and communications systems, devices, applications etc.

 

Delivered as an editable MS Word document, easily customized for your organization's specific needs.

IT systems privileges policy

$15.00Price

© 2020 IsecT Limited     Get in touch