Under active development Content is continuously updated and improved

3.3Configure Data Access Control Lists

IG1
IG2
IG3
Data
Protect

>Control Description

Configure data access control lists based on a user’s need to know. Apply data access control lists, also known as access permissions, to local and remote file systems, databases, and applications.

>Cross-Framework Mappings

>Relevant Technologies

Technology-specific guidance with authoritative sources and verification commands.

Ask AI

Configure your API key to use AI features.