presently in
the auditee's data centre with another member of your audit team.
You are currently in a large room that is subdivided into several smaller rooms, each of which has a numeric
combination lock and swipe card reader on the door. You notice two external contractors using a swipe card
and
combination number provided by the centre's reception desk to gain access to a client's suite to carry out
authorised electrical repairs.
You go to reception and ask to see the door access record for the client's suite. This indicates only one card
was
swiped. You ask the receptionist and they reply, "yes it's a common problem. We ask everyone to swipe their
cards but with contractors especially, one tends to swipe and the rest simply 'tailgate' their way in" but we know who they are from the reception sign-in.
Based on the scenario above which one of the following actions would you now take?
The scope of an organization certified against ISO/IEC 27001 states that they provide editing and web hosting
services. However, due to some changes in the organization, the technical support related to the web hosting
services has been outsourced. Should a change in the scope be initiated in this case?
© Copyrights DumpsEngine 2025. All Rights Reserved
We use cookies to ensure your best experience. So we hope you are happy to receive all cookies on the DumpsEngine.