Chapter 1. Access Control Framework
ACCESS CONTROLS ARE THE METHOD by which users gain access to resources to fulfill business needs. Business drivers should always be at the heart of any access control system, because even the most secure system is useless if it does not advance or support the goals of the organization.
Part 1 of this book discusses the need for access controls. The consequences of weak or nonexistent access control range from inconvenient to downright disastrous, depending on the nature of the resources being protected. For the average user, it may be annoying and inconvenient to have someone else reading your e-mail. On the other end of the scale, without strong access controls, companies could lose billions of dollars when ...
Get Access Control, Authentication, and Public Key Infrastructure now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.