Data Access Management
Various strategies exist to manage folder access control. These methods can be configured at the file system. Popular examples include permission matrices that specify who has permissions for a folder. Identity and Access Management (IAM) systems can granulate access by assigning roles to users, governing their permissions based on assigned duties.