Policy Configuration Strategies
When configuring policies, consider the different types of policies that your organization requires. In addition to
having both read and write policies, you might also need different flavors of read and write policies to address the
different levels of security required for various endpoints or for various user groups.