This assessment objective ensures that your system configurations enforce the principle of least privilege, meaning each user only has access to the systems, data, and functionality required to do their job—and nothing more.
This assessment objective ensures that your system configurations enforce the principle of least privilege, meaning each user only has access to the systems, data, and functionality required to do their job—and nothing more.