10/21/24
22.ARE PROCEDURES IMPLEMENTED TO ENSURE THAT ALL ACTIVITY PERFORMED ON SYSTEMS IS LOGGED? (INQUIRY AND REVIEW SUPPORTING DOCUMENTATION)
31
23.ARE COMMUNICATIONS TO AND FROM SYSTEMSVIA NETWORK COMMUNICATION EQUIPMENT LOGICALLY SECURED FROM UNAUTHORIZED ACCESS? (INQUIRY AND REVIEW SUPPORTING DOCUMENTATION)
32
16
Made with FlippingBook - Online catalogs