324
A Practical Guide to Security Assessments
jobs. In addition, procedures should be in place to ensure that as employees
from the external provider leave or change positions, access is adjusted as
needed. This ties back to the provider’s employee termination practices.
Risk:
If personnel from the external service provider unnecessarily have
access to the company’s data, there is an increased risk of unauthorized
access to sensitive data and exposure of sensitive information.
Client Response:
AU1706_book.fm Page 324 Wednesday, July 28, 2004 11:06 AM
..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
18.222.35.77