Which of the following practices is BEST to remove system access for contractors and other
temporary users when it is no longer required?
A.
Log all account usage and send it to their manager
B.
Establish predetermined automatic expiration dates
C.
Require managers to e-mail security when the user leaves
D.
Ensure each individual has signed a security acknowledgement
Explanation:
Predetermined expiration dates are the most effective means of removing systems access for
temporary users. Reliance on managers to promptly send in termination notices cannot always be
counted on, while requiring each individual to sign a security acknowledgement would have little
effect in this case.