Do you restrict physical access to information assets and functions by users and support personnel? Do you conduct risk assessments associated with data governance requirements at least once a year? Do you monitor and quantify the types, volumes and impacts on all information security incidents? Do you provide users with documentation showing the transport route of data between your systems? Do you collect capacity and use data for all relevant...