The second function within the framework entitled “Protect”, places great emphasis on managing privileged authorized user access to critical assets. In order to manage and supervise connections to critical assets, organizations commonly invest in some form of access monitoring technology.
This paper describes: