July 2024
Intermediate to advanced
486 pages
11h 19m
English
As we have seen, control A.5.15 deals with access control in systems and networks. It also sets the scene for how individual user access is set up and how access rights to systems are allocated and managed. It is not appropriate for a user access policy to be created and solely managed by either the IT department or the HR department.
It is important to have an overview of the current user authentication technology. A few years ago, it was a reasonable assumption that anything outside the network perimeter was dangerous until proven otherwise, but that anyone within the network perimeter could be trusted. While network defenses continue to be crucial, in the age of the porous perimeter it is now the case that ...
Read now
Unlock full access