As part of annual audit requirements, the security team performed a review of exceptions to the company policy that allows specific users the ability to use USB storage devices on their laptops. The review yielded the following results:
• The exception process and policy have been correctly followed by the majority of users.
• A small number of users did not create tickets for the requests but were granted access.
• All access had been approved by supervisors.
• Valid requests for the access sporadically occurred across multiple departments.
• Access, in most cases, had not been removed when it was no longer needed.
Which of the following should the company do to ensure that appropriate access is not disrupted but unneeded access is removed in a reasonable time frame?
ApplebeesWaiter1122
Highly Voted 2 years agoshady23
Most Recent 1 year, 1 month agoNemish71
1 year, 1 month agojohnabayot
1 year, 4 months agoMortG7
1 year, 5 months ago32d799a
1 year, 9 months agorline63
1 year, 9 months agostevin
1 year, 10 months agoGamsje
1 year, 11 months agojustauser
2 years, 1 month agoRobbieT
2 years, 2 months agotutita
2 years, 2 months agobrewoz404sd
2 years, 3 months agoganymede
2 years, 3 months agomedulan
2 years, 4 months agoi_luv_stoneface
2 years, 4 months agoRanaer
2 years, 4 months ago