Personnel having access to the organization’s most critical information or technology shall be verified.
Develop and maintain a human resource information/cyber security process that is applicable when recruiting, during employment and at termination of employment.