- putting appropriate measures into place to manage access points, putting
appropriate physical authentication mechanisms in place to ensure that the
strength of these are commensurate with the perimeter they support and putting
appropriate processes into place to audit access;
Email this to a friend.
Previous item —
Next item.