Cybersecurity Governance and Security Measures 387
The user prole contains all the information necessary for decisions about
access authorisations. This prole, which needs to be dened very carefully,
is the result of the denition of the policy relating to access management.
When granting a user access to the requested service, the access control sys-
tem performs a verication of the user’s access rights that takes into account
the consistency of the requested service, the equipment used, and the time and
date of the request. The consistency review consists of comparing the prole
of the service with the proles of the user and of the system from which the
request has been received. The authorisation will be granted when the ...