Limit information system access to authorized users, processes acting on behalf of authorized users, or devices (including other information systems).
Limit information system access to authorized users, processes acting on behalf of authorized users, or devices (including other information systems).