© fandijki/ShutterStock, Inc.

CHAPTER
7

Access Control System Implementations

ACCESS CONTROL SYSTEMS ARE AN ESSENTIAL PART of any organization’s information security infrastructure. An access control system protects both the organization and its users. Limiting who can have access to certain documents, computer systems, or applications—but ensuring that those who need access have it—is a security measure that needs to be developed and continuously tested.

Identifying and implementing an access control system can be challenging. This chapter addresses how policies, standards, guidelines, and procedures help you implement and maintain an access control system. The procedures you create should be easily understood by those implementing them and by the users who must abide by them.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
18.218.127.141