Table of Contents
Read section 3 on ‘Process/requirements’ and compare them to the security policies and procedures of your own work setting.