Reply to post:

Tracking users across the file system landscape

Anonymous Coward
Anonymous Coward

Users cannot be trusted, it's human nature to take the piss, so they do (MPs expenses, Mark Hurd etc).

There are cultural differences to, where Indian Employees given a company laptop take it home and "share" it with the family, and little Brother starts using it for torrents.

Enterprise-level permissions modelling is a nightmare, account dormancy processes are left until last because it's not a "broken thing" under ITIL, so it's lower down the priority list. Often the Business will not understand security modelling of their data because they want it simple and non-restrictive (like capacity management...), and with enterprise request processes as they tries to KISS it. Users cannot be trusted, because IT over-complicates.

POST COMMENT House rules

Not a member of The Register? Create a new account here.

  • Enter your comment

  • Add an icon

Anonymous cowards cannot choose their icon

Biting the hand that feeds IT © 1998–2022