Mechanisms exist to facilitate the implementation of identification and access management controls.
Does the organization facilitate the implementation of identification and access management controls?