This document provides guidance on implementing a user and group strategy for security authorization. It discusses defining groups for users, global groups, local groups, and universal groups. It recommends best practices such as not assigning access control lists (ACLs) directly to users, only adding users to global groups, and nesting global and universal groups within local groups which are granted ACLs. The document also discusses creating policies to govern IT systems and infrastructure based on business delegation models and data security categories. It recommends practices from Microsoft such as regular risk assessments and implementing groups based on departments, projects, and security categories.