Under active development Content is continuously updated and improved

4.D(2)(a)Access Controls

>Control Description

Place access controls on Information Systems, including controls to authenticate and permit access only to Authorized Individuals to protect against the unauthorized acquisition of Nonpublic Information;

>Cross-Framework Mappings

Ask AI

Configure your API key to use AI features.