the-attachment-include-all-the-requirements
- Securing users and their accounts.
- Securing storage devices.
- Access Control Mechanism.
- Securing network devices and other equipment’s in their network.
- § All sections above should include proper evaluation of alternatives
§ An effort to ensure there is standardization must be indicated in all designs.
§ Use appropriate diagrams wherever possible to illustrate your proposals.