Page:
security-access-control
Pages
Home
development architecture
development conventions
development patterns
development setup
development
features
governance
learnings
product-data-capture-analysis
product-observability-user-stories
product roadmap
product-user-guide
product vision
product
releases
security-access-control
security-audit-trail
security-change-management
security-incident-response
security-information-security-policy
security-risk-register
security
No results
1
security-access-control
Jochem de Boer edited this page 2026-04-13 14:33:49 +00:00
Table of Contents
Access Control
Access Control Policy
Principle of least privilege. Access is granted based on role and need.
System Access
| System | Who | Access Level | Justification |
|---|
Repository Access
| Repository | Who | Role | Granted |
|---|
Review Schedule
Access rights are reviewed quarterly.
| Review Date | Reviewer | Changes Made |
|---|
Last reviewed: Not yet reviewed
Product
Development
Security & Compliance