Authentication, authorization, least privilege, and access monitoring.
This chapter covers how organizations identify users, verify identity, grant permissions, and monitor access. ISC often tests this topic by asking whether access is appropriately limited, reviewed, and aligned with job responsibility.