Is enhancing security through the principle of privilege detrimental, to productivity and user satisfaction? How can we find a ground, between security and ease of use?
Do you mean the principle of least privilege, if yes, I do not think it is detrimental however, it could potentially impact operational productivity where users have multiple roles and responsibilities within an organisation which introduces some level of complexity to access control. With this, I suggest security professionals explore dynamic access control mechanisms in their infrastructure through the appropriate use of centralized management and monitoring of user activities within the network.
I believe with continuous improvement, changing risk levels and threats, it is important to continually re-evaluate assurance levels to ensure the adequacy and sufficiency of the authenticators implemented.
Is enhancing security through the principle of privilege detrimental, to productivity and user satisfaction? How can we find a ground, between security and ease of use?
Do you mean the principle of least privilege, if yes, I do not think it is detrimental however, it could potentially impact operational productivity where users have multiple roles and responsibilities within an organisation which introduces some level of complexity to access control. With this, I suggest security professionals explore dynamic access control mechanisms in their infrastructure through the appropriate use of centralized management and monitoring of user activities within the network.
What type of access control provides the strongest level of protection?
-Multi factor Authentication (MFA):
-Role-Based Access Control (RBAC)
-Attribute-Based Access Control (ABAC)
-Least Privilege Principle:
Do authenticators assurance levels get reevaluated after a certain amount of time?
I believe with continuous improvement, changing risk levels and threats, it is important to continually re-evaluate assurance levels to ensure the adequacy and sufficiency of the authenticators implemented.
Does Zero-Trust architecture solve the risks and threats in identity management?
Can a domain have multiple domain controllers?
Can tokens be stored with other device?