Employee and Authorized User List

Table of Contents
< All Topics

Employee and Authorized User List

Most cybersecurity standards require that your organization identify all individuals who are authorized to access the organization’s networks. As a practical matter, this is likely to be your employees. The template below provides a simple mechanism for tracking key information about your employees and other users authorized to access your organization’s systems.

Creation of this template was generously sponsored by:

All templates and other information provided by the CMMC Information Institute are provided as-is and without any warranties, express or implied, including any warranty of merchantability and warranty of fitness for a particular purpose.

Click to rate this post!
[Total: 0 Average: 0]