ABSTRACT

The use of group or shared user IDs and credentials can lead to a scenario where no single person can be made accountable for changes or adverse impacts to the identified system resource. This is typically seen with enterprise applications where group IDs are provided to users of the application. In the event that a single user deletes or modifies or discloses said data to an unauthorized third party, there is no way of tracing the event back to the specific user who perpetrated the security breach and hold the user accountable for said breach.