IT Policies Security Enterprise Systems

Identifying ownership, responsibility, access permission to the enterprise applications. The document outlines what is in practice.