Credentialing (information security)/Definition: Difference between revisions

From Citizendium
Jump to navigation Jump to search
imported>Howard C. Berkowitz
(New page: Mechanisms and processes used to grant privileges, in a secure information system, to an actor who has been identified an...)
 
imported>Howard C. Berkowitz
No edit summary
 
Line 1: Line 1:
Mechanisms and processes used to grant privileges, in a [[information security|secure information system]], to an actor who has been [[identification (information security)|identified]] and [[authentication (information)|authenticated]]; ideally follows the [[Principle of Least Privilege]]
Mechanisms and processes used to grant privileges, in a [[information security|secure information system]], to an actor who has been [[identification (information security)|identified]] and [[authentication (information security)|authenticated]]; ideally follows the [[Principle of Least Privilege]]

Latest revision as of 11:15, 6 May 2010

Mechanisms and processes used to grant privileges, in a secure information system, to an actor who has been identified and authenticated; ideally follows the Principle of Least Privilege