Local security threats
If a person that is already inside the network then such a person already has greater access to computing resources than a person that outside the network. People that are inside the network need to be trusted. Careful selection of such people must be in place, this is done via rigid hiring process, careful management review, proper technical access and right HR policies.
Comments
Post a Comment