Non permitted technology strategy
Assign topic to the user
Develop a non-permitted technology strategy that includes identification of hardware and software that is highly vulnerable or will no longer be supported by the manufacturer/developer. An effective strategy should include a migration plan that identifies timelines for removal, replacement, or updating of affected systems.
Answer: For this draft you should consider the Secure Development Policy and the Operating Procedures for Information and Communication Technology templates, since they will provide the bases for identification and handling of non-permitted technologies as required by your customer.
Comment as guest or Sign in
Dec 06, 2017