IAM-16: Are processes, procedures, and technical measures to verify access to data
and system functions authorized, defined, implemented, and evaluated?
The information system should require approvals for authorizations to access the system resources and follow communicated and approved applicable policies.
The organization should adopt multiple authorization concepts (i.e., user manager, system/information owner).
Control implemented
Control ownership
Description
Define, implement and evaluate processes, procedures and technical
measures to verify access to data and system functions is authorized.