This figure shows an example of the security matrix. Each user is listed in columns A (last name) , B (First Name), and C (ID) and each security group is listed across row 1 in columns D,E,F,G and so on. The matrix is filled out by associating each user with at least one group by entering an X in the appropriate column (s) for each each user.