No action is required to secure data or resources. All data and resources are protected until the owner of the data or a security administrator takes action to allow access. This approach provides the most effective type of security because it reduces the likelihood of exposures through omission of security controls. It also reduces the amount of work required to secure the environment.
|
Copyright © 2009 CA Technologies.
All rights reserved.
|
|