This includes the audit of security information on a routine basis to ensure that changes to data are made by the appropriate person with the appropriate role and authority.

4 data classification levels

user roles

 

Recent changes RSS feed