Which of the following provides the framework for designing and developing logical access controls?
A. Information systems security policy
B. Access control lists
C. Password management
D. System configuration files
A. Information systems security policy
B. Access control lists
C. Password management
D. System configuration files