Designing secure code
n
Defining ACL (Access Control List)
Lists:
n
Determine the resource you use
n
Determine the business defined access
requirements
n
Determine the appropriate access control
technology
n
Convert the access requirements to
access control technology