Process Identification List

Table of Contents
< All Topics

Process Identification List

To be able to identify rogue or unauthorized activity in your organization’s systems, you first have to know what activity is authorized. That includes creating a list of authorized user accounts (see here for that list), and also creating a list of those times when an application is authorized to do something on behalf of a user, like performing a software update or making a backup of files. The template below helps you track the applications and other processes that are authorized to act on behalf of a user.

Creation of this template was generously sponsored by:

All templates and other information provided by the CMMC Information Institute are provided as-is and without any warranties, express or implied, including any warranty of merchantability and warranty of fitness for a particular purpose.

Click to rate this post!
[Total: 0 Average: 0]