The role of authorization is very important when it comes to cybersecurity. We can go to two extremes when it comes to authorization. I can give an example of your physical vault. You can lock it in such a way that you can’t access your precious assets even when you need them. The other extreme is that you don’t lock your vault at all, making it super easy for you to have access to your assets. Both of these extremes are not good for you. Similarly, authorization in the cybersecurity world is all about the extent of access to your technology assets. It should be designed in such a way that the legible users of the system have the right level of access to the tech asset.
YouTube: https://youtu.be/zuvXjV4aRs0
Commenti