Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

Does your organisation operate a secure configuration process to reduce any unnecessary vulnerabilities in your IT systems including servers, endpoints, network devices and systems hosted in a cloud environment?

Yes, XXXXXwe use Infrastructure-as-Code to minimise (and wherever possible eliminate) human engagement in the provisioning processes

Deployment and configuration of laptops (we use Macs) is managed by JamfPRO to ensure they stay in line with our requirements.