Information Technology (IT) infrastructures need to meet the demands of its internal operations and customer services. With rapid growing team across various departments there needs to be a secure and efficient user management system in place. This includes segregating data and system access according to the specific roles and responsibilities of each department, while upholding a high standard for data privacy and security. This is a critical aspect of data privacy and compliance regulation.
The following commands will be covered:
· su — run commands with a substitute user and group ID
· sudo — execute a command as the superuser
· touch — create a file without any content
· cd — change directory
· groupadd — create a new user group
· chown — change the owner of files and directories
· chmod — set or modify a file’s permissions
· useradd — creates a new user account
· passwd — sets and changes password for users
· mv — moves files and directories from one directory to another
· mkdir — allow users to create new directories
File Permissions:
Now that you have some general know of IT infrastructure and linux permissions, let’s set up an IT infrastructure efficiently and securely
Step 1: Create Directories with Dummy files
sudo su and mkdir
touch and cd ..
Step 2: Create Groups, Change the Owner and Change file permission
groupadd, chown, and chmod
Step 3: Add Users
useradd was use to create a user and -c was used to create a comment
Step 4: Create User Password
passwd
Step 5: Move Directories to the root
sudo mv
Step 6: Verify User only has access to their Directory
su username to change users and then attempt to access other directory
Step 7: Change User file permission to only view their own profile
chmod 700
By implementing the steps above your IT infrastructure data privacy and security will be efficient and secure!!!