Requires that each user account, processes, system, device, etc. within the computing environment can only access the information and resources that are necessary for its legitimate purpose.
Requires that each user account, processes, system, device, etc. within the computing environment can only access the information and resources that are necessary for its legitimate purpose.
Comments
0 comments
Please sign in to leave a comment.