Is enhancing security through the principle of privilege detrimental, to productivity and user satisfaction? How can we find a ground, between security and ease of use?
Do you mean the principle of least privilege, if yes, I do not think it is detrimental however, it could potentially impact operational productivity where users have multiple roles and responsibilities within an organisation which introduces some level of complexity to access control. With this, I suggest security professionals explore dynamic access control mechanisms in their infrastructure through the appropriate use of centralized management and monitoring of user activities within the network.
I believe with continuous improvement, changing risk levels and threats, it is important to continually re-evaluate assurance levels to ensure the adequacy and sufficiency of the authenticators implemented.
Yannick Rugamba says
Is enhancing security through the principle of privilege detrimental, to productivity and user satisfaction? How can we find a ground, between security and ease of use?
Ooreofeoluwa Koyejo says
Do you mean the principle of least privilege, if yes, I do not think it is detrimental however, it could potentially impact operational productivity where users have multiple roles and responsibilities within an organisation which introduces some level of complexity to access control. With this, I suggest security professionals explore dynamic access control mechanisms in their infrastructure through the appropriate use of centralized management and monitoring of user activities within the network.
Celinemary Turner says
What type of access control provides the strongest level of protection?
Eyup Aslanbay says
-Multi factor Authentication (MFA):
-Role-Based Access Control (RBAC)
-Attribute-Based Access Control (ABAC)
-Least Privilege Principle:
Jon Stillwagon says
Do authenticators assurance levels get reevaluated after a certain amount of time?
Ooreofeoluwa Koyejo says
I believe with continuous improvement, changing risk levels and threats, it is important to continually re-evaluate assurance levels to ensure the adequacy and sufficiency of the authenticators implemented.
Ooreofeoluwa Koyejo says
Does Zero-Trust architecture solve the risks and threats in identity management?
Eyup Aslanbay says
Can a domain have multiple domain controllers?
Bo Wang says
Can tokens be stored with other device?