... 3) policies and how they map with standards and procedures. Although this text is identified as information security policies, standards, and procedures, the skill set discussed can be used ... tracked. The Custodian is generally responsible for providing the tools to monitor the user list. Users are authorized system users (employees, contractors, consultants, vendors, etc .) responsible ... processing environment. The proper focus for this policy is the establishment of business unit procedures to support the restoration of critical business processes, applications, and systems in...