The Tech stack is a list of all the technologies that MUI currently uses to support the business. The Tech stack lists systems/applications/tools/data used by all departments, detailing the business purpose/description, owners, provisioners, teams that access the tool, and other relevant information.
Set it to No if we can configure 2FA but we can’t enforce it (for all accounts).
Set it to Yes if 2FA can be enforced for all accounts.
People in charge of granting and removing team members’ access to a tool.
A minimum of two provisioners/deprovisioners should be named for every tool because of the bus factor.
Also, see ‣
Red. Restricted and must remain confidential. This is MUI’s most sensitive data, and access to it should be considered privileged and must be explicitly approved. Exposure of this data to unauthorized parties could cause extreme loss to MUI and/or its customers. In the gravest scenario, exposure to this data could trigger or cause a business extinction event.
Examples include:
Orange. Data is subject to laws and regulations that should not be made generally available. Unauthorized access or disclosure could cause significant or financial material loss, risk of harm to MUI if exposed to unauthorized parties, breach contractual obligations, and/or adversely impact MUI, its partners, employees, contractors, and customers.
Examples: