T 2.36 Inappropriate restriction of user environment

Most operating systems offer the ability to restrict the user environment of every user on an individual basis. On operating systems where this is not the case, special security products can generally be used instead. There are basically two ways to restrict a user environment in this case:

In both cases, it is possible to restrict the users to such a great extent that they cannot execute the most important functions or may not even be able to work reasonably and efficiently with the IT system any more.

Another way of restricting a user environment is to limit the amount of disk space available to a user. If the disk space of a user is exhausted, the user will not be able to store any more information. Depending on how the affected IT systems are partitioned, this may affect numerous users and applications. If the data and system partitions were not separated in advance, the entire IT system may fail, because no more disk space is available to store data from the memory in the swap file on the hard disk, for example.

Examples: