![]() For instance, some enterprise services require a system account to access confidential data or restricted networks. However, privileged accounts can also refer to non-human users accounts. We often refer to these privileged accounts as superusers or administrators. Since actions such as accessing restricted information, adding or deleting users and reconfiguring applications have security and operational ramifications, only trusted users should have the relevant access to perform these tasks. Therefore, increasing the platform's security requires an organization to limit the number of users who have privileges to access administrative functions. The principle of least privilege states that every user should only have the access they need to perform their duties and nothing more. This role-based security model offers system administrators greater control and determines the actions each user can perform on the system. Every technology system manages its security by providing users with different levels of access. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. Archives
March 2023
Categories |