State of Security: Arizona

November 2, 2018
  • Strengthen and formalize processes, documentation and standards to facilitate comprehensive management, maintenance and use of current-state technology.
  • Foster a culture of security to enable cost-effective protections commensurate with the risk and value of critical and sensitive software, hardware, and information.
  • Enhance strategies for the use of user identities, mobile devices, and transaction monitoring information to improve the effectiveness of existing security controls.
  • Leverage modern identity and access management technologies to control access to election systems based on user identity.
prestitial ad