Identity, Roles & IT Security
Unidentified or Anonymous users
Users without credentials or those choosing to access work-spaces as anonymous will have very limited access to content. They will not be trusted by online systems except where content is safe to be exposed to all, the public or the common clientele, for, such are not easily tracked.
Authenticated or Signed-in Users
Authenticated or signed in users are allocated roles and will have access to content as programmed or owned. For this, a user account and a well defined role are a must for serous online living and work.
Admin and Developer Users
Admin (or administrator) users are IT or domain specialists who create roles and accounts, and assign requisite permissions to such accounts in those roles.
Developers (Those Who Write Code...) support Admins and equally or even more enabled on what they are able on line.
Within all contexts and work space environments, IT security involves the same basic functions of authentication, authorization, identity, trust, confidentiality, integrity and policy management. For systems, programs, applications, apps as conceived and used today, it all (Information and IT security...) begins with stakeholder requirements in multiple phases of technical work - from understanding of concepts, through design and architecture to development and retirement of applications.
What is an InfoSec framework? ... Infosec blueprint sets the model to be followed in the creation of the design, selection, and the initial and ongoing implementation of all subsequent security controls, including information security policies, security education and training programs, and technological controls.