Problem
• Identify five control activities, and auditor tests on controls corresponding to each, for the following control objective:
• Logical security tools and supporting processes are implemented and configured to restrict access to critical applications to authorized users only.