Posts

Showing posts from April, 2020

What's the point of Role Based Access Control?

Image
Can a stolen password give you the keys to an entire kingdom? In fact, it appears that 81% of data thefts that took place in 2019 used stolen or weak passwords to access the network. We need to do better than that in 2020. We need to review the standards for our rights and implement Role Based Access Control (RBAC) and configure SSH keys to ensure that users stay where they belong. assigned on the network. To configure authentication using SSH keys, you must visit Foxpass as they offer easy Role Based Access Control that restrict SSH access.  Role Based Access Control (RBAC): what is it? Roles Based Access Control (RBAC) is a network security concept whereby the network grants rights to users based on their role in the enterprise. It's easy as pie: the financial department has no right to put its nose into the data of the human resources department, and vice versa. Each user of the network has a role, and each role has a set of access rights to th...