3.3: Configure Data Access Control Lists

CSF v1.1 References:

CSF v2.0 References:

PF v1.0 References:


Previous Version:

Control Statement

Configure data access control lists based on a user’s need to know. Apply data access control lists, also known as access permissions, to local and remote file systems, databases, and applications.

[csf.tools Note: For more information on the Critical Security Controls, visit the Center for Internet Security.]