9.9 Do you have policies and matrices in place for access control and authentication of applications and equipment?

All systems require authentication, either passwords or SSL certificates to access. All best practices are maintained, and multiple access levels/roles are applied to each system and user.

Please for more information request the latest Cyber-Security-Policy-documentation and/or Operations-Manual-document by filling out our support form.