Skip to main content
Security Controls
Administrative and Technical Cybersecurity Controls
Checklists
Acceptable Use
CHK-AU-012
Login to view status
CHK-AU-012
Report loss or theft of endpoint devices immediately
Checklists
Acceptable Use
Description
6.4 Loss, Theft, and Compromise
Examples
Incident report