When a security audit is performed at a company, the auditor reports that new users have access to network resources beyond their normal job roles. Additionally, users who move to different positions retain their prior permissions. What kind of violation is occurring?
- network policy
- least privilege
- audit
- password
Answers Explanation & Hints:
Users should have access to information on a need to know basis. When a user moves from job role to job role, the same concept applies. |