|
|
@ -330,7 +330,7 @@ Only the most basic and safest of accesses should be done with
|
|
|
|
one systems administrator present.
|
|
|
|
one systems administrator present.
|
|
|
|
</p>
|
|
|
|
</p>
|
|
|
|
|
|
|
|
|
|
|
|
</p>
|
|
|
|
<p>
|
|
|
|
Only Systems Administrators are authorised to access the data.
|
|
|
|
Only Systems Administrators are authorised to access the data.
|
|
|
|
All others must not access the data.
|
|
|
|
All others must not access the data.
|
|
|
|
All are responsible for protecting the data
|
|
|
|
All are responsible for protecting the data
|
|
|
@ -524,7 +524,7 @@ The access control lists (see §1.1.1) are:
|
|
|
|
<td>change the source code repository</td>
|
|
|
|
<td>change the source code repository</td>
|
|
|
|
<td>exclusive with Access Engineers and systems administrators</td>
|
|
|
|
<td>exclusive with Access Engineers and systems administrators</td>
|
|
|
|
<td>software assessment team leader</td>
|
|
|
|
<td>software assessment team leader</td>
|
|
|
|
</tr><table>
|
|
|
|
</tr></table>
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
<p>
|
|
|
|
<p>
|
|
|
|