Credentialing (information security)/Definition: Difference between revisions
Jump to navigation
Jump to search
imported>Howard C. Berkowitz (New page: Mechanisms and processes used to grant privileges, in a secure information system, to an actor who has been identified an...) |
imported>Howard C. Berkowitz No edit summary |
||
Line 1: | Line 1: | ||
Mechanisms and processes used to grant privileges, in a [[information security|secure information system]], to an actor who has been [[identification (information security)|identified]] and [[authentication (information)|authenticated]]; ideally follows the [[Principle of Least Privilege]] | Mechanisms and processes used to grant privileges, in a [[information security|secure information system]], to an actor who has been [[identification (information security)|identified]] and [[authentication (information security)|authenticated]]; ideally follows the [[Principle of Least Privilege]] |
Latest revision as of 11:15, 6 May 2010
Mechanisms and processes used to grant privileges, in a secure information system, to an actor who has been identified and authenticated; ideally follows the Principle of Least Privilege