Published by:
|

Systems are configured in a way to only allow individuals and other systems access to functions they require to carry out their job/purpose. This is a fundamental component to cyber security and is one of the five technical control themes for the Cyber Essentials standard. Also: referred to as Least Privilege.

Share this post

Related Posts

Get in touch

SPEAK WITH AN EXPERT

01423 425 498

Related Posts