Category: Other Summary: This article explains Schild's access controls-how user permissions and sensitivity clearances work across your organization and how they affect access to data and functionality.
To keep your organization secure and compliant, Schild uses two layers of access control:
Users must have both the correct permissions and sufficient clearance to access information. Permissions only concern administrators operating administration. Sensitivity clearances govern all.
Permissions define what administrators can do within each area of the platform.
Action | Meaning |
---|---|
View | Can view the record. |
Add | Can create new records. |
Change | Can edit existing records. |
Delete | Can remove records. |
Example: An administrator with
view_equipment
andchange_equipment
permissions can view and update equipment records, but cannot create or delete them.
Schild applies permissions per record type. Examples include:
There are additional permissions to control specifics:
To protect potentially sensitive information Schild further controls access with sensitivity clearances. All data records have a sensitivity. The record sensitivities are the following:
Level | Meaning |
---|---|
Top secret | Unauthorized disclosure could reasonably cause exceedingly great damage to the organization or associative parties (including people). |
Secret | Unauthorized disclosure could reasonably cause serious damage to the organization or associative parties (including people). |
Confidential | Unauthorized disclosure could reasonably cause damage to the organization or associative parties (including people). |
Controlled, unclassified | All else |
These meanings are subjective. Each organization should establish their own meanings as they pertain to their organization.