Académique Documents
Professionnel Documents
Culture Documents
Objectives
When you complete this lesson you will be able to:
Design an access control strategy for files and folders Analyze auditing requirements Design an access control strategy for the registry Design a permission structure for registry objects Design a strategy for the encryption and decryption of files and folders Design security for a backup and recovery strategy
Step 2
Controlling what data those users can access
Resource Authorization
User/ ACL Account Group/ACL Account Group/ Resource Group Role-Based Authorization
An encryption strategy for files and folders includes an assessment of vital data, an assessment of the environment, policies for using EFS, and procedures for recovering encrypted files. Obviously, not all files are sensitive enough to warrant encryption. In most cases, files protected with two layers of security will be safe. However, files that contain sensitive data such as social security numbers, credit card data, medical or health data, or corporate trade secrets should be protected with EFS.
Creating a Strategy for the Encryption and Decryption of Files and Folders
Summary
Design an access control strategy for files and folders Design an access control strategy for the registry