Примеры использования Interview personnel на Английском языке и их переводы на Русский язык
{-}
-
Official
-
Colloquial
Examine policies and interview personnel to verify that system configuration standards are updated as new vulnerability issues are identified, as defined in Requirement 6.1.
Observe testing processes and interview personnel to verify procedures are in place to ensure production data(live PANs)
Examine vendor documentation and interview personnel to verify that strong cryptography for the technology in use is implemented according to industry best practices and/or vendor recommendations.
Observe processes and interview personnel to verify that cryptographic keys are stored securely for example,
Interview personnel and observe processes for managing accounts used by third parties to access,
Examine information security policies and procedures and interview personnel to verify that roles
Interview personnel and examine records to verify that all media sent outside the facility is logged
Review documentation and interview personnel to verify a methodology is defined
Examine policies and interview personnel to verify that system configuration standards are applied when new systems are configured and verified as being in place before a system is installed on the network.
A3.2.6.1.b Interview personnel and examine records of actions taken when clear-text PAN is detected leaving the CDE via an unauthorized channel,
Observe procedures and interview personnel to verify that visitors must be authorized before they are granted access to,
Examine documented policies and procedures and interview personnel to verify processes are defined
review policies and interview personnel to verify there is a documented business justification for the storage of sensitive authentication data.
Observe processes and interview personnel assigned to development/test environments
Examine detection and alerting processes and interview personnel to verify that processes are implemented for all critical security controls,
For a sample of significant changes, examine change records, interview personnel, and observe the affected systems/networks to verify that applicable PCI DSS requirements were implemented and documentation updated as part of the change.
examine change records, interview personnel and observe the affected systems/networks to verify that applicable PCI DSS requirements were implemented and documentation updated as part of the change.
Interview personnel to verify that evolving malware threats are monitored and evaluated for systems
In UNMISET, 80 per cent of interviewed personnel had not completed the basic security training developed by the Office of the United Nations Security Coordinator.
Also, in some missions, staff members(up to 80 per cent of interviewed personnel) have not completed the basic security training developed by the Office of the United Nations Security Coordinator.