Discussion about this post

User's avatar
Eric Pare's avatar

Great list.

Maybe a few things to add if they fit:

-List of all security personnel

-Access to cyber/infosec training modules and metrics

-Process validation for return of constituent asset (computers, phones, access cards/tokens, etc) upon termination

-A general physical security section

Expand full comment
1 more comment...

No posts