||Develop Regular Access Audit Procedures: Service Providers, Network Operators, and Equipment Suppliers should charter an independent group (outside of the administrators of the devices) to perform regular audits of access and privileges to systems, networks, and applications. The frequency of these audits should depend on the criticality or sensitivity of the associated assets.
||Service Provider; Network Operator; Equipment Supplier
||Cyber Security;Network Design;Network Elements;Network Operations;
|| Information Security Forum. Security Audit/Review. The Forums Standard of Good Practice, The Standard for Information Security. November 2000.