Previous
Previous

A.9.2.6: Removal or Adjustment of Access Rights

Next
Next

A.9.2.4: Management of Secret Authentication Information of Users