2 Comments
User's avatar
Eric Pare's avatar

Great list.

Maybe a few things to add if they fit:

-List of all security personnel

-Access to cyber/infosec training modules and metrics

-Process validation for return of constituent asset (computers, phones, access cards/tokens, etc) upon termination

-A general physical security section

Expand full comment
Walter Haydock's avatar

Thanks for the additions!

Expand full comment