Power Checklist: Vetting Employees for Security Sensitive Operations

Last Updated: February 13, 2025
Format: PDF

Most organizations have applications, processes, and data that must be kept secure by authorized personnel. Determining the eligibility of individuals to access or administer these components can be a challenge.

Whether you need to establish full access permissions to folders for the purpose of backups or you’re responsible for handling data that could adversely affect the organization if leaked, this checklist, created by Scott Matteson for TechRepublic Premium, will help you determine the necessary steps involved.

  • Featured text from the download:

    2: Determine qualifications

    Qualifications are based on more than a background check. This step involves assessing the employee’s ability to effectively administer secure data, recognize the importance of applying comprehensive and effective permissions to the data, and remain discreet where needed.

    Does the employee understand the value of the data and the need for privacy? Do they have the skills to recover data in the event of a system failure or data corruption? Are they familiar with good habits such as locking workstations/mobile devices when not in use, determining the ‘why’ behind access requests, and not writing down passwords or providing them to unauthorized personnel?

Improve your business operations with our in-depth nine-page PDF. This is available for download at just $19. Alternatively, enjoy complimentary access with a Premium annual subscription.

TIME SAVED: Crafting this content required 18 hours of dedicated writing, editing, research, and design.