Title
Protect Information through Access Control Lists
Description
Protect all information stored on systems with file system, network share, claims, application, or database specific access control lists. These controls will enforce the principle that only authorized individuals should have access to the information based on their need to access the information as a part of their responsibilities.
Reference Item Details
Category: Controlled Access Based on the Need to Know