CDP 35948455: Provide Role Related Access (app) #13
Reference in New Issue
Block a user
Delete Branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
CDP Control ID:
35948455Category: Least Privileged Access
Frequency: Annually
Owner: h.noerenberg
Parent: #1
Requirement & Guidance
Least Privileged Access Requirement: Provide access to individuals that is appropriate for their role and responsibilities, using the concept of Least Privileged Access, meaning individuals are only granted access to those resources and systems that are required to enable their delivery role. To give proper access it may be appropriate to create a separate new user ID rather than extending access rights of an existing ID. Guidance: Confirm Role Based Access Control is maintained in all systems and applications to ensure that no resource has been assigned additional privileges than required for the services. Maintain and review the access levels of resources for appropriateness (right people having right access to right systems) and record any changes for tracking and auditing purposes. Additional information can be found on CDP website Least Privileged Access
CapaKraken Action Plan — 35948455 Role-Based Access (Least Privilege)
Scope: Role-Based Access Control, individuell je Rolle.
Aktueller Stand:
docs/acn-security-compliance-status.md3.2.2.3.11 OK — RBAC mitadminProcedureRoleenum +UserRolejoin table (packages/db/prisma/schema.prisma)Todos:
adminProcedure/protectedProcedureauf Least Privilege prüfendocs/rbac-matrix.md(neu) + Review-LogDateien:
packages/api/src/router/trpc.ts— Procedure-Levelspackages/db/prisma/schema.prisma— Role enumCapaKraken Compliance-Status
EAPPS-Mapping:
3.2.2.3.11 / Access Control StandardStatus: ✅ OK (laut
docs/acn-security-compliance-status.md)Zusammenfassung
Zugriff wird strikt rollenbasiert erteilt. Jede Rolle hat
defaultPermissions: PermissionKey[]; einzelne User können zusätzlich individuelle Overrides erhalten.Nachweis
SystemRoleConfigmitdefaultPermissions Json @db.JsonB—packages/db/prisma/schema.prismaUser.permissionOverridesfür Feingranularität —packages/db/prisma/schema.prismaapps/web/src/app/(app)/adminEntscheidung: Control ist nachweislich erfüllt → Ticket wird geschlossen.