Documenting a network is essential in troubleshooting and support. Explain the security implications in keeping such documentation.
How should an organization balance access to the documentation against protecting the network from intentional hacking, compromise or damage?
How should an organization balance access to the documentation against protecting the network from intentional hacking, compromise or damage?