From “Authentication is Secondary” by Bob Cringely:
“Remember that all the authentication in the world will not protect against a privileged user doing the wrong thing. It’s just that logging may help to determine what happened after the fact.”
Tags: authentication