3.3—Configure Data Access Control Lists
IG1
IG2
IG3
Data
Protect
>Control Description
Configure data access control lists based on a user’s need to know. Apply data access control lists, also known as access permissions, to local and remote file systems, databases, and applications.
>Cross-Framework Mappings
>Relevant Technologies
Technology-specific guidance with authoritative sources and verification commands.
Ask AI
Configure your API key to use AI features.