ContentThe Different Faces of Policy EnforcementStacey LumJanuary 9, 2004The traditional “triple A’s” of access security, Authentication, Authorization, and Accounting, have been joined by a newcomer - Auditing. Like its predecessors, auditing is most effective when enforced, rather than being voluntary.