Explain how access control lists fit into a larger security policy in the organization.

Posted Date: