CISSP Implement and Manage Authorization Mechanisms – Bk1D5T4
Suppose that you have the opportunity to devise Manage, from scratch, a scheme for access control to all of the assets for which you are responsible. Not only can you pick the security devices and policies, but you can also decide on the very kinds of attributes that will determine access authority for everyone. One way to start such a design is to imagine that you—or your avatar—will be queried, moment to moment, for an …
CISSP Implement and Manage Authorization Mechanisms – Bk1D5T4 Read More »