O'Reilly logo

Access Control, Authentication, and Public Key Infrastructure by Tricia Ballad, Bill Ballad, Erin Banks

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 11. Access Control System Implementations

ACCESS CONTROL SYSTEMS ARE AN ESSENTIAL PART of any organization. An access control system protects both the organization and its users. Limiting who can have access to certain documents, computer systems, or applications but ensuring those who need full access have it is a security measure that needs to be developed and continuously tested.

Identifying and implementing an access control system can be challenging. This chapter addresses how policies, standards, guidelines, and procedures help you implement and maintain an access control system. The procedures you create should be easily understood by those implementing them and the users who must abide by them.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required