Are controls in place to prevent unauthorized access to tenant application, program, or object source code, and assure it is restricted to authorized personnel only? Jonathan van Driessen September 03, 2021 14:54 Yes. Related articles Are controls in place to prevent unauthorized access to your application, program, or object source code, and assure it is restricted to authorized personnel only? Have you implemented backup or recovery mechanisms to ensure compliance with regulatory, statutory, contractual or business requirements? Do you require a periodical authorization and validation (e.g. at least annually) of the entitlements for all system users and administrators (exclusive of users maintained by your tenants), based on the rule of least privilege? Comments 0 comments Please sign in to leave a comment.
Comments
0 comments
Please sign in to leave a comment.