Business impact of several access controls.

Identify the business impact of several access controls.
Identify mitigation techniques for weaknesses of each of the access controls.