Xoxoday
CtrlK
  • ๐Ÿ““User Resources
    • ๐Ÿ‘จโ€๐Ÿ’ผFor Admins
      • ๐Ÿ“ŒGetting Started
      • ๐Ÿš€Plum Launch Communication Kit
      • Xoxo Points
      • Xoxo Codes
      • Points vs Codes
      • Xoxo Links
      • Domain Authentication Guide
      • ๐Ÿ’ฐAdd Funds
      • Campaigns
      • ๐ŸฌReports
      • ๐Ÿ’ณPrepaid Card User Guide
      • ๐Ÿ”Security and Compliance
        • Cryptography & Encryption
        • Email Whitelisting
        • Governance, Risk, & Data Compliance
        • Application,Dev & Security
        • Cloud Security
        • HR Compliance
        • Identity & Access Management
        • Solution Development
        • Security Operations
        • Training and Awareness
        • Vulnerability and Threat Management
        • Security Operations & Technical Capabilities and Support
        • Data Management
        • Policies & Procedures
        • Tax Compliance
        • Privacy Compliance
        • Cloud Security Alliance
        • Others
        • Documents
          • Data Security
          • Information Security
          • Admin/Business
          • Others
          • Finance Compliance
    • ๐Ÿง‘โ€๐Ÿคโ€๐Ÿง‘For End-Users
    • ๐Ÿ”—Pre-Built Integrations
    • ๐Ÿ›ฃ๏ธProduct Roadmap
  • ๐Ÿ‘จโ€๐Ÿ’ปDeveloper Resources
  • ๐Ÿ“…Release Notes
Powered by GitBook
On this page
  • 1.Physical and Environmental Security Procedure
  • 2.Business Continuity Management Procedure
  • 3. Bring Your Own Device Policy
  • 4. Supplier Management Procedure
  • 5.Asset Management Procedure
  • 6.Logging and Monitoring Procedure
  • 7.Change Management Procedure
  • 8.SDLC Procedure

Was this helpful?

  1. ๐Ÿ““User Resources
  2. ๐Ÿ‘จโ€๐Ÿ’ผFor Admins
  3. ๐Ÿ”Security and Compliance
  4. Documents

Admin/Business

1.Physical and Environmental Security Procedure

2.Business Continuity Management Procedure

3. Bring Your Own Device Policy

4. Supplier Management Procedure

5.Asset Management Procedure

6.Logging and Monitoring Procedure

7.Change Management Procedure

8.SDLC Procedure

PreviousInformation SecurityNextOthers

Last updated 4 years ago

Was this helpful?