Applications, Databases, and Desktop Data Need Least Privilege, Too
John Mutch and
Brian Anderson
Chapter Chapter 8 in Preventing Good People from doing Bad Things, 2011, pp 127-140 from Springer
Abstract:
Abstract Physical, virtual, and cloud infrastructure exists for only one purpose: to store information assets and run applications that give those assets purpose. Since you’ve kept reading this far, you are now aware of the implications of unmonitored access to this infrastructure, but what about the core reason for buying, implementing and managing all of this in the first place?
Keywords: Access Control Policy; Cloud Infrastructure; Good People; Virtual Server; External Context (search for similar items in EconPapers)
Date: 2011
References: Add references at CitEc
Citations:
There are no downloads for this item, see the EconPapers FAQ for hints about obtaining it.
Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.
Export reference: BibTeX
RIS (EndNote, ProCite, RefMan)
HTML/Text
Persistent link: https://EconPapers.repec.org/RePEc:spr:sprchp:978-1-4302-3922-2_8
Ordering information: This item can be ordered from
http://www.springer.com/9781430239222
DOI: 10.1007/978-1-4302-3922-2_8
Access Statistics for this chapter
More chapters in Springer Books from Springer
Bibliographic data for series maintained by Sonal Shukla () and Springer Nature Abstracting and Indexing ().