Information and Communication Technology - Guideline 39. Comprehensive access control system
The institution implements a comprehensive system to control access to technological equipment and devices and software systems.
This includes mechanisms for data access control, endpoint access control, authentication and identification, user privilege management, network access control, password management and logs.
This content is available for ISSA members only.
Please login to your My ISSA to access this page.
Login