tailieunhanh - Applied Oracle Security: Developing Secure Database and Middleware Environments- P40

Applied Oracle Security: Developing Secure Database and Middleware Environments- P40:Computer security is a field of study that continues to undergo significant changes at an extremely fast pace. As a result of research combined with increases in computing capacity, computer security has reached what many consider to be “early adulthood.” From advances in encryption and encryption devices to identity management and enterprise auditing, the computer security field is as vast and complex as it is sophisticated and powerful | 364 Part III Identity Management These questions should generally cover almost any identity management-related processes in a typical enterprise. Answering these questions should give you a comprehensive view of how identity management is conducted in the current environment and therefore should help you prioritize the processes that have the highest complexity and highest risk of authorized access provisioning. For example automating the deprovisioning process may not drive the highest cost savings but may reduce the risk of having a disgruntled employee with access to mission-critical systems. Understanding and prioritizing these goals will help you identify which problems to solve first. Discovering Identity Management Requirements Around Information Every action and investment made in the name of identity management is done for one reason enforcing that the right person is accessing the right resource that is information . Information is an amorphous concept since it exists in so many shapes and forms across the enterprise in so many systems and so many databases. The challenge around information security discovery is knowing what information looks like in each system and knowing who should access what parts of the information. It is important that you keep a functional business view and definition of data. For instance they should be classified by how a business analyst would look at the data for example customer data product data employee data supplier data finance data facilities data and so on . Classification should not be driven by their technical characteristics such as XML Oracle e-Business Suite 11i SAP Business Intelligence and Austin Data Center . Policies around accessing information should also follow a similar approach and remain as technically neutral as possible at least at this phase of the project. An example policy around access controlling the finance data could be that a finance analyst can query and read the current quarter earnings data .

crossorigin="anonymous">
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.