2 Comments

Great list.

Maybe a few things to add if they fit:

-List of all security personnel

-Access to cyber/infosec training modules and metrics

-Process validation for return of constituent asset (computers, phones, access cards/tokens, etc) upon termination

-A general physical security section

Expand full comment

Thanks for the additions!

Expand full comment