Mechanisms exist to enforce a two-person rule for implementing changes to sensitive Technology Assets, Applications and/or Services (TAAS).
Does the organization enforce a two-person rule for implementing changes to sensitive Technology Assets, Applications and/or Services (TAAS)?
- wordsmithed control