Do you have controls in place ensuring timely removal of systems access that is no longer required for business purposes? Jonathan van Driessen September 03, 2021 14:55 Yes, we do. Related articles Are controls in place to prevent unauthorized access to tenant application, program, or object source code, and assure it is restricted to authorized personnel only? Do you support role-based access control (RBAC) for end-users / administrators? Comments 0 comments Please sign in to leave a comment.
Comments
0 comments
Please sign in to leave a comment.