this post was submitted on 20 Jul 2025
5 points (100.0% liked)

Cyber Security

118 readers
1 users here now

๐Ÿ•ต๐Ÿฟ Surveillance, Information security, Cybersecurity, Interoperability, Analytics, Data tracking, Digital Disinformation, Decentralised Finance, Algorithmic Sovereignty & Privacy By Design.

Questions and answers are encouraged. Be excellent to each other. ๐Ÿ•Š๏ธ

founded 1 year ago
MODERATORS
top 1 comments
sorted by: hot top controversial new old
[โ€“] Zachariah@lemmy.world 1 points 1 week ago

Comparison with sudo

By using a role-based access control model, this project allows us to better manage administrative tasks. With this project, you could distribute privileges and prevent them from escalating directly. Unlike sudo does, we don't want to give entire privileges for any insignificant administrative task. You can configure our tool easily with chsr command. To find out which capability is needed for a administrative command, we provide the capable command. With these two tools, administrators could configure its system to respect the least privilege principle.