4.D(2)(a)—Access Controls
>Control Description
Place access controls on Information Systems, including controls to authenticate and permit access only to Authorized Individuals to protect against the unauthorized acquisition of Nonpublic Information;
>Cross-Framework Mappings
Ask AI
Configure your API key to use AI features.