This includes the audit of security information on a routine basis to ensure that changes to data are made by the appropriate person with the appropriate role and authority.
4 data classification levels
user roles