When deploying a security control mechanism to protect assets, it is crucial to ensure that unauthorized users have limited access. This minimizes the risk of attacks and data breaches by controlling who can access sensitive information and resources. Security controls should be designed to prevent unauthorized access while ensuring that authorized users have the necessary access to perform their duties.
References:
Dell EMC Information Storage and Management V5 course material, Module on Security and Protection.
Contribute your Thoughts:
Chosen Answer:
This is a voting comment (?). You can switch to a simple comment. It is better to Upvote an existing comment if you don't have anything to add.
Submit