Restrict access by setting directory and file permissions that are not specific to users or privileged accounts.
Protect files stored locally with proper permissions to limit opportunities for adversaries to impact data storage. 
|ICS||T0811||Data from Information Repositories|
|ICS||T0872||Indicator Removal on Host|
Use file system access controls to protect system and application folders.
|ICS||T0873||Project File Infection||
Ensure permissions restrict project file access to only engineer and technician user groups and accounts.
Ensure proper process and file permissions are in place to inhibit adversaries from disabling or interfering with critical services.
|ICS||T0882||Theft of Operational Information|