A type of access control by which the operating system constrains the ability of a subject or initiator to access or generally perform some sort of operation on an object or target.
Sign up for your free trial today and get hands on with all the compliance features that ISMS.online has to offer
Find out more