fbpx

Is access to the facility where the information systems resides limited by: 1) verifying individual access authorizations before granting access to the facility and 2) controlling ingress/ egress to the facility using access cards and professional security guards?

Is access to the facility where the information systems resides limited by: 1) verifying individual access authorizations before granting access to the facility and 2) controlling ingress/ egress to the facility using access cards and professional security guards?