Customer Needs Assessment

Types of Users

In the example, the Berlin_developers group might need to be subdivided based on the projects to which workgroups are assigned. For example, if the company manufactured household appliances, the Berlin_developers group might include workgroups such as:

Small appliances workgroup

Kitchen appliances workgroup

Laundry appliances workgroup

Cleaning appliances workgroup

By defining groups based on their network access needs, you can set up access control policies more efficiently.

To protect the company’s proprietary information—including patents and new products—the company might want to restrict each workgroup to a limited set of network resources. For example, the small appliances workgroup should not be able to access the resources dedicated to the kitchen appliances workgroup.

Temporary Employees

Temporary workers are typically less-trusted users, whose network access must be carefully managed. Because temporary employees often require different access controls than regular employees, you should place them in a separate group and limit their access to a few network resources. You may also want to restrict login times to working hours only.

Ideally, you would also configure temporary user accounts with an expiration date that coincides with the period the employee is contracted to work for the company. If the length of the work assignment is not known, you might want to configure the account to expire periodically so that the temporary employee’s manager must renew it to keep it active.

Guests

Guests represent another group with special access needs. Typically, these users should be able to access only limited network resources. For example, they may need only Internet access and basic print services. The network access policy for these users should grant them this limited access but prevent them from accessing other network resources such as company servers.

2-6