IT Infrastructure Security Policies
Read the following Scenario
You work for a large, private health care organization that has server, mainframe, and RSA user access. Your organization requires identification of the types of user access policies provided to its employees. Sean, your manager, was impressed with the work you did on User Domain policies. This time, Sean is asking you to write descriptions for policies that affect server, mainframe, and RSA user access.