Implement and maintain access control lists to restrict unauthorized access to systems, networks, and data.
This defensive technique helps protect against the following adversary techniques:
Ready to build a comprehensive defense strategy?