This template is meant to be a starting point to determine who should have access to what. It identifies the stakeholder’s position and responsibility, and then determines subsequent required access levels.

  • Collect current access levels across the network and current data access levels across all users.
  • Determine access responsibilities for all positions. Identify any users with special circumstances.
  • Determine access needs for each group of users.

Also In

Secure Critical Systems and Intellectual Property Against APT

Protect yourself from being boarded and raided by cyber privateers.

Related Content

Social

Get Access

Get Instant Access
To unlock the full content, please fill out our simple form and receive instant access.