Open Research Newcastle
Browse

A methodology to minimise excessively permissive security configurations

Download (587.96 kB)
conference contribution
posted on 2025-05-10, 22:15 authored by Rukshan AthaudaRukshan Athauda, Geoffrey SkinnerGeoffrey Skinner, Brian Regan
Today's complex IT systems and multitude of possible permission configurations create a challenge for IT administrators, especially in determining optimal permission configuration for user groups. This is further exaggerated with the users' privilege requirements not being clearly specified or available. This typically leads to excessively permissive security configurations in IT systems which results in security vulnerabilities. This paper proposes a methodology and high-level architecture for a system that enables to elicit and deploy IT permissions in a convenient and secure manner avoiding many pitfalls that exist today. The proposed methodology's applicability is illustrated using two scenarios: a typical organisation with complex security requirements and a collaborative online environment.

History

Source title

Recent Advances in Applied Computer Science: Proceedings of the 8th WSEAS International Conference on Applied Computer Science (ACS' 08)

Name of conference

8th WSEAS International Conference on Applied Computer Science (ACS'08)

Location

Venice, Italy

Start date

2008-11-21

End date

2008-11-23

Pagination

187-192

Editors

Misra, S. C., et. al.

Publisher

WSEAS Press

Place published

Stevens Point, WI

Language

  • en, English

College/Research Centre

Faculty of Science and Information Technology

School

School of Design, Communication and Information Technology

Usage metrics

    Publications

    Exports

    RefWorks
    BibTeX
    Ref. manager
    Endnote
    DataCite
    NLM
    DC