The information system should require approvals for authorizations to access the system resources and follow communicated and approved applicable policies.
The organization should adopt multiple authorization concepts (i.e., user manager, system/information owner).
Define, implement and evaluate processes, procedures and technical measures to verify access to data and system functions is authorized.