Do you have controls in place ensuring timely removal of systems access that is no longer required for business purposes? Jonathan van Driessen September 03, 2021 14:55 Yes, we do. Related articles What are the audit and reporting capabilities of the solution related to user management? Are controls in place to prevent unauthorized access to tenant application, program, or object source code, and assure it is restricted to authorized personnel only? What technology languages / platforms / stacks / components are utilised in the scope of the application? Comments 0 comments Please sign in to leave a comment.
Comments
0 comments
Please sign in to leave a comment.