Which of the following statements best defines the "authorization" as a component of identity, entitlement, and access management?
The process of specifying and maintaining access policies
Checking data storage to make sure it meets compliance requirements
Giving a third party vendor permission to work on your cloud solution
Establishing/asserting the identity to the application
Enforcing the rules by which access is granted to the resources
Submit