Are file integrity checks in place to detect unauthorised changes to databases, files, programs and system configuration?
Can you provide tenants with evidence documenting your policies and procedures governing asset management and re-purposing of equipment?