Secure access to the IT system / information asset?

When clicking on this bar, you will be able to see the gaps within the category.

Access to the system must be protected by appropriate technical measures. This gap is removed by selecting “Yes” in the system description when user accesses are regulated with the appropriate measures (1).

It must be justified why ‘Secure access to the IT system/information asset’ is not relevant (2).

Adresse
                            

GapSolutions A/S
Uraniavej 6
DK-8700 Horsens

CVR
                            

CVR-nr. 38582356

Telefon
                           

Salg & administration
(+45) 8844 0808

Helpline & konsulenter
(+45) 2199 0808

E-mail
                            

Kontakt@gapsolutions.dk

Support@gapsolutions.dk

Vi bruger udelukkende tekniske cookies på vores hjemmeside. For yderligere information se vores Cookiepolitik.

Vi er ISO 27001-certificeret og ISAE 3000-auditeret.