NIST-800-53-PS-4

Personnel Termination

Personnel Security Policy for 18F

a

Disabling, termination and conducting of exit interviews are initiated and facilitated by the supervisor/CO/COR of an individual. Retrieval of all information system-related property which includes HDPS-12 cards, authentication tokens (USB for privileged access), laptops, etc. is a common control provided by IO. More information can be found in the GSA IT Security Procedural Guide 03-23, Termination and Transfer cloud.gov disables access to accounts within the same day of termination.

b

cloud.gov revokes all access associated to the individual the same day of termination.

c

Disabling, termination and conducting of exit interviews are initiated and facilitated by the supervisor/CO/COR of an individual. Retrieval of all information system-related property which includes HDPS-12 cards, authentication tokens (USB for privileged access), laptops, etc. is a common control provided by IO. More information can be found in the GSA IT Security Procedural Guide 03-23, Termination and Transfer

d

Disabling, termination and conducting of exit interviews are initiated and facilitated by the supervisor/CO/COR of an individual. Retrieval of all information system-related property which includes HDPS-12 cards, authentication tokens (USB for privileged access), laptops, etc. is a common control provided by IO. More information can be found in the GSA IT Security Procedural Guide 03-23, Termination and Transfer

e

Disabling, termination and conducting of exit interviews are initiated and facilitated by the supervisor/CO/COR of an individual. Retrieval of all information system-related property which includes HDPS-12 cards, authentication tokens (USB for privileged access), laptops, etc. is a common control provided by IO. More information can be found in the GSA IT Security Procedural Guide 03-23, Termination and Transfer

f

Disabling, termination and conducting of exit interviews are initiated and facilitated by the supervisor/CO/COR of an individual. Retrieval of all information system-related property which includes HDPS-12 cards, authentication tokens (USB for privileged access), laptops, etc. is a common control provided by IO. More information can be found in the GSA IT Security Procedural Guide 03-23, Termination and Transfer

results matching ""

    No results matching ""