O'Reilly logo

Microsoft® Windows® Security: Essentials by Darril Gibson

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Exploring Audit Policies

A secure operating system needs to be able to identify individual users, grant access based on their identities, and track their actions. This starts by implementing practices that reflect the three As (AAA) of security: authentication, authorization, and accounting. Figure 5-1 shows how they combine to contribute to reliable accountability within an organization.

The AAAs of security refers to authentication, authorization, and accounting. Together they provide accountability.

Figure 5-1: AAA of security

f0501.eps

When a user attempts to access a system, the first step is to ensure that users prove who they are or authenticate ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required