All privileged user accounts are established and administered in accordance with a role-based access scheme that organizes all system and network privileges into roles (e.g., key management, network, system administration, database administration, web-administration). The IAM tracks privileged role assignments.
|MAC / CONF ||Impact ||Subject Area |
| MACI |
|High ||Enclave Computing Environment |