Access Rights and Access Controls in the Workstation Domain
You learned in the previous sections how important it is to implement the correct controls in the Workstation Domain. Proper security controls limit access to objects based on a user’s identity. Access control methods may be based on the permissions granted to a user or group, or they may be based on a user’s security clearance. Either way, access rights start with knowing which user requests access to an object and what the user’s identity permits him or her to do.
Most computers require you to log on before you can access any resources on the computer. Even systems set up to automatically log on are actually logging on to a predefined user account. The first step in logging on is ...
Get Auditing IT Infrastructures for Compliance, 3rd Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.