Security is one of the most important aspects of file system organization. File system trustees and trustee rights specify who can access different directories and files. File system directory and file attributes specify what authenticated users can do with the file, such as being able to merely read a file or to modify it.
Organize directories and files according to who needs access to them. In other words, use the directory structure to reflect access requirements.
For example, you can structure the hierarchy of directories in such a way as to take advantage of the inheritance aspect of rights. Associate file system trustees and trustee rights with volumes, directories, and files as a safeguard against deletion or modification by users. Specify directory and file attributes to control what users can do.
Group the user community based on each user’s access requirements.
Users grouped by role (relative to file access) can be assigned ownership of directories and files, and users whose roles vary can be assigned rights on the basis of equivalence.
Users needing a particular kind of access to certain directories and files can be grouped so that appropriate access belongs to the group (and consequently, to each member).