To establish login and password procedures for access to all servers, workstations, and network-attached devices (where applicable) thereby ensuring the reliability, accessibility, and security of such devices.
Log in to view the complete standard.
IT Security ensures that an organization's material and software resources are used only for their intended purposes. At ITD, security is a part of everything we do.
Hosting is running and maintaining a computer system or application on someone's behalf; typically within a modern datacenter.
Enterprise Architecture (EA) interweaves business and IT together. It consists of the vision, principles, and standards that guide the purchases and deployment of technology within the enterprise.
Access and Authorization services provide a security framework for controlling who can use IT resources and what degree of activities, resources, or services they are permitted.