3.0 Access Control
3.3 Organize users and computers into appropriate security groups and roles while distinguishing between appropriate rights and privileges.
For this section you want to be aware of the importance of maintaining and implementing certain security groups and roles so that users are given proper privileges and rights on a computer system. Be sure you are aware of centralized and decentralized methods to maintain these security actions.
In order for any company or organization to have a true sense of security on their networks and computer systems, there has to be some sort of system used that will allow for proper security groups and roles so that certain users are only granted the rights and privileges on the system that they need. For any company to establish let alone maintain security, it is vital to ensure that access control models are set so that users are given the proper permissions and rights. Before security groups and roles can be set, the organization needs to determine what users require what privileges and so on, without this the process becomes much more tedious.
When it comes to managing privileges and rights on a network, there are two main ideas to keep in mind: centralization and decentralization. With centralized management of privileges and rights, there are servers that are entirely responsible for implementing, maintaining, and controlling all over the access rights, privileges, and security controls that are put in place. Think of a RADIUS authentication server when you think of a centralized privilege management.
Decentralization privilege management requires that each individual system be responsible for maintaining and implementing these controls and accesses. A workgroup network is an ideal decentralized privilege management system.
GetCertify4Less and GetCertified4Less
No comments:
Post a Comment