Use Info-Tech's Identity and Access Management Policy to define and document the necessary access control levels and processes across your organization.
Use this policy in conjunction with the Identification and Authentication Policy.
Use this tool in conjunction with the project blueprint, Develop and Deploy Security Policies.