Page 48 - 4-Level Funnel Diagram Design for PowerPoint
P. 48

Access Controls                                                                   STEP 1





             Logical Security Controls                                                       Access is approved.










                        STEP 6                                                                                                      STEP 2



                        Continuous Monitoring                                                                                       Access is Appropriate







                                                                                         Access


                     STEP 5                                                                                                          STEP 3


                     Auditing Application-layer                                                                                      Access is Periodically
                     Security.                                                                                                       Monitored









                                                                   STEP 4



                                                           Terminated Accounts are
                                                           disabled in a Timely Manner.
   43   44   45   46   47   48   49   50   51   52   53