Employee and Authorized User List
Most cybersecurity standards require that your organization identify all individuals who are authorized to access the organization’s networks. As a practical matter, this is likely to be your employees. The template below provides a simple mechanism for tracking key information about your employees and other users authorized to access your organization’s systems.
Creation of this template was generously sponsored by:
All templates and other information provided by the CMMC Information Institute are provided as-is and without any warranties, express or implied, including any warranty of merchantability and warranty of fitness for a particular purpose.