IAM-16: Are processes, procedures, and technical measures to verify access to data
and system functions authorized, defined, implemented, and evaluated?
Control implemented
Control ownership
Description
Define, implement and evaluate processes, procedures and technical
measures to verify access to data and system functions is authorized.