
Security • Chapter 12 563
evidence items—for example, starting with zone and moving on to more specific
ones such as publisher.A complicating factor is that there are three security levels
(Enterprise, Machine, and User), with their own code group hierarchy.All three
are evaluated, resulting in three permission sets, which at the end are intersected,
thereby determining the effective permission set.
It is the administrator’s responsibility to construct code group hierarchies that
can quickly be scanned and enforce a high level of security.To do so, you must
take several factors into account:
■
Limit the number of levels.
■
Use membership conditions at the ...