9/11/23
21. ARE PROCEDURES IMPLEMENTED TO ENSURE THAT ALL ACTIVITY PERFORMED ON SYSTEMS IS RESTRICTED AND SECURED FROM UNAUTHORIZED ACCESS? (INQUIRY AND REVIEW SUPPORTING DOCUMENTATION)
31
22. ARE PROCEDURES IMPLEMENTED TO ENSURE THAT ALL ACTIVITY PERFORMED ON SYSTEMS IS LOGGED? (INQUIRY AND REVIEW SUPPORTING DOCUMENTATION)
32
16
Made with FlippingBook - Online catalogs