Reference no: EM133394258
Assignment:
1. Articulate the principle of least privilege and why it's important to reduce privileges.
2. Describe how to design a system to limit the damage of a compromise.
3. Provide examples of why trust is important in computer security.
Privilege separation ensures that a program is divided into parts and limits the specific privileges they require in order to perform a particular task.Ensuring privileges are separated and limited is an essential tenet of prudent cybersecurity hygiene. Taking a concerted approach to authenticating users and limiting respective privileges helps to manage and reduce risk in a sustainable and enduring manner. A proactive and policy-based approach limits potential abuse and mitigates risk.
For your post, apply this concept to your work or home environment. Consider the following and discuss your approach:
1. What model is currently in place now?
a. Within the context of your system, are there any controls in place to limit access to data or monitor for impropriety?
b. Are any safeguards in place to ensure programs, applications or system calls do not access unwanted areas?
- Are there any programs or system processes that come to your mind that you would want to segment or limit access to/from?
- Within the context of your home or work network, how are different levels of access and privileges assigned or administered?
c. Are there system, network, or domain administrators?
d. How are privileges currently divided out to users?
e. Are there any relevant policies or procedures limiting privileges or ensuring proper separations across users?
f. What steps can you take, or would you propose, in order to advance these principles (e.g., principle of least privilege, separation of privileges)?
- How can you apply privilege separation within your environment to limit compromise?
- How would you propose institutionalizing these changes?