Access Controls STEP 1
Logical Security Controls Access is approved.
STEP 6 STEP 2
Continuous Monitoring Access is Appropriate
Access
STEP 5 STEP 3
Auditing Application-layer Access is Periodically
Security. Monitored
STEP 4
Terminated Accounts are
disabled in a Timely Manner.