Wednesday, August 16, 2006

Managing Employee Access

Ok, so we have performed our Risk Assessment, classified our assets and data so that we know what and where everything is that we are trying to protect. Next, we need to consider who needs access to the which data, and how we are going to facilitate this.

You can see how important that Risk Assessment is now. If you don't know what you are trying to protect and where it resides, you don't stand a chance.

There are two parts of Managing Employee Access. The first, is authentication, the second access.

Technorati Tags:

No comments: