Overview
The Access Control Architecture defines how scanning operations are authorized and restricted within the SecurityCenter platform. It ensures that only authorized users and systems can perform specific actions, such as scanning networks or accessing sensitive data.
Key Components
- Authentication: Verifies user identity through credentials (e.g., username/password, API keys).
- Authorization: Determines user permissions based on roles and policies.
- Policy Enforcement: Applies rules to restrict access to scanning resources.
Implementation Details
- Role-Based Access Control (RBAC): Assign roles (e.g.,
Admin
,Analyst
,Guest
) with predefined permissions. - Network Segmentation: Restricts scanning to authorized subnets or IP ranges.
- Audit Logs: Tracks access and scanning activities for compliance.
Best Practices
- Regularly update access policies to reflect changing security needs.
- Use multi-factor authentication (MFA) for critical scanning operations.
- Monitor and review user permissions quarterly.
For a deeper dive into scanning fundamentals, visit our Scanning Overview documentation.