CHAPTER |
Access Control System Implementations |
ACCESS CONTROL SYSTEMS ARE AN ESSENTIAL PART of any organization’s information security infrastructure. An access control system protects both the organization and its users. Limiting who can have access to certain documents, computer systems, or applications—but ensuring that those who need access have it—is a security measure that needs to be developed and continuously tested.
Identifying and implementing an access control system can be challenging. This chapter addresses how policies, standards, guidelines, and procedures help you implement and maintain an access control system. The procedures you create should be easily understood by those implementing them and by the users who must abide by them.
This chapter covers the following topics and concepts:
When you complete this chapter, you will be able to:
18.218.127.141