2 Factor Authentication (2FA)
“At the RSA security conference 2020, Microsoft engineers said that 99.9% of the compromised accounts they track every month don’t use multi-factor authentication, a solution that stops most automated account attacks.”
Role Based Access Control
& User Management
User Management allows client to create PEER accounts, manage user’s information and PEER access rights such as administrator, Staff or User and Role-based Access Control or RBAC is a client requirement customization to restrict access to authorised users. Specific roles are created for different job functions, given specific permission within the system and assigned to users upon administration approval
“In UK, an insurance company allowed staff unrestricted access to data and was stunned when gruesome fatal car crash pictures involving a particular model of car appeared on their direct competitor’s website criticising safety records. The culprit was not in a claims role but in an internal administrative position.”
Large scale projects spans a long period of time and always include a dynamic characteristic with regards to manpower. With at least hundreds of workers involved in a project and consistently being re-tasked or removed, it is easy to lose track of access given to specific personnel thus, creating a potential security risk through information leaked to unauthorised personnel.
PEER have included RBAC and User Management to facilitate administration of security, allowing easy authorising and restricting of permission to specific roles
PEER’s User management module allows client to facilitate their users, with easy creation and management of accounts, access rights along with tracking of users through information required such as name, email address, company information while the RBAC module allows our clients to set up specific roles and permission such as Applicants, Assessors, Approvers, Inspectors along with roles and permission customisable to our client’s needs. Then, assigning roles to users when required and removed when the user no longer has authority to carry out job. This makes sure that sensitive informations and actions to be carried out are only accessible by authorised personnel