Data Protocol Docs Logo

assessment

Security Risk of Access Controls

For more on this topic, take the Course: Security & Privacy

2 min read

Share this doc:


Reflect & Assess

Strict access control is an essential part of protecting the data you store. Answer the following questions to evaluate the security risks of your access control measures and make a plan to improve.

  1. At my organization, only people who really need data have access to it.

  2. We monitor and profile access patterns to find abnormalities and harden access controls when indicated.

  3. Multi-factor authentication, or MFA, is required to access any internet-facing tools like VPN, email, and chat programs.

  4. We monitor access lists for new users, especially users with advanced privileges.

  5. Our authorization policy is separate from the rest of our code.

  6. It's easy for developers to integrate our authorization policies.

  7. I'm confident that we can assess the strength of data linkage and assign a risk value to that linkage.

Next Steps

Would it be easy for a bad actor to compromise a user's identity based on your verification techniques?

For more on this topic, take the Course:


Data Protocol Course

Security & Privacy

In this course, you will learn how to build a framework that reduces the attack surface for sensitive data and how to implement tools for the management of access control and monitoring, such as Access Control Lists (ACLs) and encryption keys.

Share this doc:


Your privacy matters.

By clicking "Accept All", you are agreeing to Data Protocol's Cookie Policy.