This article describes the tasks for managing security information.
Now that you have planned the security for your system, you need to ensure
that your plan remains effective as your business needs change. This topic
emphasizes simplicity as an essential goal in designing security. You have
designed user groups as patterns for individual users. You have tried to use
public authority, authorization lists, and library authority rather than specific
individual authorities. Take advantage of that approach as you manage security:
- When you add a new user group or a new application, use the techniques
that you used to plan security.
- When you need to make changes to security, try to take a general approach
rather than creating an exception to solve a specific problem.