. be based upon a formal security stancethat is determined by management. In general, a security stance of 'least privilege'can be used in most commercial, financial, Internet, and. concerns,requirements, goals, and objectives for your organization. Representation shouldbe as broad as practical but at a minimum include: data security, legal, humanresources, internal audit, operations, and. Bio: Charles R. MartinCharles R. Martin has been in the computer business for more than 30 years, and involved withcomputer security since 1983. He was the original architect for a DARPA B3 /A1 ...