26.1 – Privileges and Access Rights

26.1 – Privileges and Access Rights
In order to carry out their responsibilities, managers require the permissions to perform tasks such as system configuration, software installation, resource allocation, user permission management and more. With this privileged access, managers practically always also have access to the services and data that run on the systems they handle. Further, manager’s teams have usually shared their managerial details. Though this makes the easy distribution of workloads, it also makes it hard to allocate the specific task to a specific person—and so to hold anyone responsible for a policy breach or violation. Though this security gap is nothing new, it is…
To access this content, you must subscribe to this General Subscription, or log in if you are a member.

Share this post