A project manager is overseeing a software development project where certain team members require temporary, after-hours access to the company's secure data center to perform critical system updates. Company policy requires proper procedures for after-hours facility access, including approvals and logging by the appropriate department. What action should the project manager take to ensure compliance with the policy?
Provide the team members with access keys to the data center authorized for specific after-hours use.
Advise the team members to use their personal access cards, ensuring compliance with necessary approvals.
Submit a request to the security department for after-hours access approval.
Reschedule the after-hours updates to align with approved access protocols.
The project manager should submit a request to the security department for after-hours access approval. This action aligns with the company's policy by ensuring that access is pre-approved and properly logged by the appropriate department. Providing team members with access keys, even if authorized for specific use, may bypass official approval processes and compromise security protocols. Advising team members to use their personal access cards does not guarantee that the necessary approvals and logging are in place. Rescheduling the updates may not be feasible due to project timelines and does not address compliance with access procedures.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are the key components of a facility access policy?
Open an interactive chat with Bash
Why is it important to comply with security protocols in a data center?
Open an interactive chat with Bash
What steps should a project manager take when submitting a request for after-hours access?