Xoxoday
search
Ctrlk
Xoxoday
  • πŸ““User Resources
    • πŸ‘¨β€πŸ’ΌFor Admins
      • πŸ“ŒGetting Started
      • πŸš€Plum Launch Communication Kit
      • Xoxo Points
      • Xoxo Codes
      • Points vs Codes
      • Xoxo Links
      • Domain Authentication Guide
      • πŸ’°Add Funds
      • Campaigns
      • 🏬Reports
      • πŸ’³Prepaid Card User Guide
      • πŸ”Security and Compliance
        • Cryptography & Encryption
        • Email Whitelisting
        • Governance, Risk, & Data Compliance
        • Application,Dev & Security
        • Cloud Security
        • HR Compliance
        • Identity & Access Management
        • Solution Development
        • Security Operations
        • Training and Awareness
        • Vulnerability and Threat Management
        • Security Operations & Technical Capabilities and Support
        • Data Management
        • Policies & Procedures
        • Tax Compliance
        • Privacy Compliance
        • Cloud Security Alliance
        • Others
        • Documents
          • Data Security
          • Information Security
          • Admin/Business
          • Others
          • Finance Compliance
    • πŸ§‘β€πŸ€β€πŸ§‘For End-Users
    • πŸ”—Pre-Built Integrations
    • πŸ›£οΈProduct Roadmap
  • πŸ‘¨β€πŸ’»Developer Resources
  • πŸ“…Release Notes
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
  1. πŸ““User Resourceschevron-right
  2. πŸ‘¨β€πŸ’ΌFor Adminschevron-right
  3. πŸ”Security and Compliancechevron-right
  4. Documents

Admin/Business

hashtag
1.Physical and Environmental Security Procedurearrow-up-right

hashtag
2.Business Continuity Management Procedurearrow-up-right

hashtag
3. Bring Your Own Device Policyarrow-up-right

hashtag
4. Supplier Management Procedurearrow-up-right

hashtag
5.Asset Management Procedurearrow-up-right

hashtag
6.Logging and Monitoring Procedurearrow-up-right

hashtag
7.Change Management Procedurearrow-up-right

hashtag
8.SDLC Procedurearrow-up-right

PreviousInformation Securitychevron-leftNextOtherschevron-right

Last updated 4 years ago

Was this helpful?

  • 1.Physical and Environmental Security Procedure
  • 2.Business Continuity Management Procedure
  • 3. Bring Your Own Device Policy
  • 4. Supplier Management Procedure
  • 5.Asset Management Procedure
  • 6.Logging and Monitoring Procedure
  • 7.Change Management Procedure
  • 8.SDLC Procedure

Was this helpful?