Authorization
Could have:
database of info, says what each user can access
tags on data/applics that say who can access it
location-based controls, e.g. a certain subnet
audit logs, can act as deterrent to abuse
Previous slide
Next slide
Back to first slide
View graphic version