- Check access and system logs often
- Secure weak spots, like "back door" facilities
- Inspect physical access controls, wake them up if you have to
- Examine existing change controls
- Timely remove asset access
- Inventory IT assets and track equipment returns
- Activate available audit trail recording features
No comments:
Post a Comment