Power checklist: Vetting employees for security sensitive operations
- Provided by TechRepublic Premium
- Published May 22, 2016
- Topic TechRepublic Premium
- Format PDF
This checklist will help you find the safest route to governing appropriate access to sensitive data, apps, and processes. You can print the list or use it in electronic form.