Function and Role Matrix - User Security

We are looking to enhance our security and wondered if any FENXT users have done a Role Matrix exercise designed to delineate system roles and abilities. If yes, would you care to share your means of design and potentially a shell matrix?

Categories