To determine who has been given permission to use a particular system resource, an IS auditor should review:
To determine who has been given permission to use a particular system resource, an IS auditor should review: