Power Checklist: Vetting Employees for Security Sensitive Operations
Most organizations have applications, processes and data that must be kept secure by authorized personnel. Determining the eligibility of individuals to access or administer these components can be a challenge.
Whether you need to establish full access permissions to folders for the purpose of backups or you’re responsible for handling data that could adversely affect the organization if leaked, this checklist from TechRepublic Premium will help you determine the necessary steps involved.
From the checklist:
1: Conduct a background check
A background check is the first step you should take when considering granting security access to new or existing personnel. While it’s not necessarily a silver bullet, it can rapidly screen out inappropriate candidates.
The download comprises a nine-page PDF and Word document.
Previously priced at $99, this is now available to download for $9. Or free with a Premium annual subscription: click here to find out more.
TIME SAVED: It took 16 hours of writing, editing and research to create this content.
Resource Details
* Sign up for a TechRepublic Premium subscription for $299.99/year, and download this content as well as any other content in our library. Cancel anytime. Details here.
* Sign up for a TechRepublic Premium subscription for $299.99/year, and download this content as well as any other content in our library. Cancel anytime. Details here.