In CKS, a security process can be applied on secured entities.
Some resources in CKS require an access control process. The process defines the actions allowed on the resources. The access control depends on three components: rights, profiles, and permissions.
The entities covered by the access control process are secured entities. They mainly involve members and data.
By extension, the web services used to handle secured entities lists (for example users lists or folders lists) are also protected.