Which of the following is the best approach to validate the continued need for auser to have privileged access to system resources?
What determines if an organization is going to operate under a discretionary,mandatory, or nondiscretionary access control model?