Process Identification List

Table of Contents
< All Topics
Print

Process Identification List

To be able to identify rogue or unauthorized activity in your organization’s systems, you first have to know what activity is authorized. That includes creating a list of authorized user accounts (see here for that list), and also creating a list of those times when an application is authorized to do something on behalf of a user, like performing a software update or making a backup of files. The template below helps you track the applications and other processes that are authorized to act on behalf of a user.

Creation of this template was generously sponsored by:

All templates and other information provided by the CMMC Information Institute are provided as-is and without any warranties, express or implied, including any warranty of merchantability and warranty of fitness for a particular purpose.

Click to rate this post!
[Total: 0 Average: 0]