Even after your CA Top Secret security implementation has been completed, you must not stop monitoring and evaluating the effectiveness of the implementation. Your environment can change and your implementation of CA Top Secret must be as dynamic as your environment.
|
Copyright © 2014 CA Technologies.
All rights reserved.
|
|