Cybersecurity
Access Control
Security mechanism that restricts system access based on identity, role, or clearance level. SOC 2 maps access controls to CC6.1, where 68% of findings cite accounts active more than 30 days after employee departure.