...
File Services (storage)
Exception Process
Form: https://security.utexas.edu/exception/ Anchor
http://security.utexas.edu/policies/irusp.html#section_5_19
Anchor | ||||
---|---|---|---|---|
|
...
According to the Information Security Office (ISO), logical security controls would consist of implementing permissions, logging, and auditing mechanisms for access to unattended systems. For example, physical access of the "server room" should have an Access Control System in place to track who has access to a particular area, and logs when an individual has entered the controlled area.
Form: https://security.utexas.edu/exception/
Anchor | ||||
---|---|---|---|---|
|
In the last field of the exception form,
University Affiliates
Anchor | ||||
---|---|---|---|---|
|
...