As we live in an interconnected world, we are exposed to misuses and attacks. As we will see in this chapter, security is of utmost importance irrespective of whether it's a small or large network. Even if role definitions require additional work, you should take the security of your network into consideration. Just like you fasten the seat belt in your car, you'd rather spend this extra time once and forget about it thereafter.
It can be summarized in 3 processes: write down all users who will require access, itemize what resources they will have access to, and then connect the dots between the lists. That's what we are going to see now.