Reader small image

You're reading from  Enterprise Cloud Security and Governance

Product typeBook
Published inDec 2017
PublisherPackt
ISBN-139781788299558
Edition1st Edition
Tools
Right arrow
Author (1)
Zeal Vora
Zeal Vora
author image
Zeal Vora

Zeal Vora works as a DevSecOps Engineer primarily in the area of Defensive Security. He spends his days protecting and implementing security controls to help mitigate attacks both on the Cloud and servers. He is actively involved in security consultation, helping various startups which have been breached to overcome the breach and start again with a secure infrastructure.
Read more about Zeal Vora

Right arrow

Access control list

We generally work with a basic set of access control with the help of chmod, chown, and chgrp commands that are available in Linux. Although they are useful, they do not provide granular control with respect to individual users.

Use case

There is a file named file.txt and the permissions associated with the file are as follows:

-rw-rw---- 1 kplabs kplabs 0 Jun 23 23:15 file.txt

There is a requirement where we need to give the users, Bob and Andy, read access to file.txt and James should have the rwx access to the file, and no one else apart from the owner and the three users should have any access to the file.

The permission requirement is explained via the following diagram:

How to implement this use...

lock icon
The rest of the page is locked
Previous PageNext Page
You have been reading a chapter from
Enterprise Cloud Security and Governance
Published in: Dec 2017Publisher: PacktISBN-13: 9781788299558

Author (1)

author image
Zeal Vora

Zeal Vora works as a DevSecOps Engineer primarily in the area of Defensive Security. He spends his days protecting and implementing security controls to help mitigate attacks both on the Cloud and servers. He is actively involved in security consultation, helping various startups which have been breached to overcome the breach and start again with a secure infrastructure.
Read more about Zeal Vora