The problem of permissions plagues the enterprise. Each employee with access to the enterprise IT environment needs to have some level of permission for each network asset, but the level of permission is usually different for each employee. For example, some employees may be able to look at customer information, but not change it, others…