What policies and procedures are in place to detect access to data?

What policies and procedures are in place to detect, prove, and mitigate access to data?

Access is granted only to authorized, as-needed personnel, and all infrastructure providing access control, auditing, and detection is implemented in accordance with PCI DSS. With the exception of two network administrations access is granted and revoked by task and time.

Have more questions? Submit a request

Comments

Powered by Zendesk