Protection Against Unauthorized Users

Off-the-shelf operating systems have a flawed notion of trust – the privileged user is implicitly trusted. This leads to a variety of security problems. Many attempts have been made to fix this issue including one within a topnotch United States military agency. However, these solutions have proven impractical for general business use. We use advanced access control measures that make it difficult for unauthorized users, including the “root” user, from accessing the protected data sets. The Server General  trust model doesn’t include the traditional privileged user. Thus, the privileged user is not allowed to view data stored in a secure repository. We are quite aware of the fact that given enough time and money a motivated attacker can get around our controls but we are raising the bar for an attacker.