
Data Access Governance: Tooling to gain insight into current NTFS rights within the network
1. Introduction 2. Standard Windows tooling 3. Largescale software packages 4. Focused commercial tooling 5. Freeware 6. Conclusion 7. Approach with Perdemia's Permission Analyzer 2. Standard Windows tooling 1. Introduction It is common knowledge that most cases of data theft occur within the organization. No hacks from the outside, but people within the organization who (accidentally) unfairly have access to sensitive data. Apart from the financial damage, damage to reputation, this leads in many cases to legal violations, loss of