To achieve a C2 rating, a system must be able to isolate the resources to be protected so that their access can be controlled and audited via appropriate discretionary access control
0, a boot protection module, has been released as a standalone program for users whose primary need is to protect their information resources by providing discretionary access control
to individual or networked PCs.
EAC for Windows 95 incorporates the functionality required for the protection of unclassified, sensitive information by the US Department of Defense, including Identification and Authentication, Discretionary Access Control
, Auditing and "Object Reuse.