Trial lock

This Research is for Members Only

Not a member? Unlock a free sample of our research now!

Already a member?

Sign in now

This template is meant to be a starting point to determine who should have access to what. It identifies the stakeholder’s position and responsibility, and then determines subsequent required access levels.

  • Collect current access levels across the network and current data access levels across all users.
  • Determine access responsibilities for all positions. Identify any users with special circumstances.
  • Determine access needs for each group of users.

Also In

Secure Critical Systems and Intellectual Property Against APT

Protect yourself from being boarded and raided by cyber privateers.

Related Content


Get Access

Get Instant Access
To unlock the full content, please fill out our simple form and receive instant access.