Access Control Fundamentals
2. Access Control Challenges
- Various types of users need different levels of access - Internal users, contractors, outsiders, partners, etc.
- Resources have different classification levels- Confidential, internal use only, private, public, etc.
- Diverse identity data must be kept on different types of users - Credentials, personal data, contact information, work-related data, digital certificates, cognitive passwords, etc.
- The corporate environment is continually changing- Business environment needs, resource access needs, employee roles, actual employees, etc.