iSeries (AS/400) Security - Policy Creation

A security policy is the corner stone that insures your company's data is secured properly. ATS's first task is to understand your business and identify data that requires controlled access and protection not only from intentional damage but, as in most cases, accidental damage. Once all key data has been identified and its sensitivity defined, access to servers and applications can be detailed.

A security policy is not just about insuring correct access, or prevention from intentional damage; it is also about helping to insure availability. If systems that data and applications reside on are not considered in your security policy, a system outage accidental or otherwise can cause loss of data, or applications to be unavailable for a period of time.

Deliverables:

• Servers, Applications and Data are defined and their purpose documented
• Policy defining access to Servers, Applications and Data at all levels
• Policy defining authority to Servers, Applications and Data at all levels

Benefits:

• Defined security policy based on business requirements
• Relevant levels of access and authority are defined
• Clear understanding of required levels of access and authority is gained

iSeries (AS/400) Security - Policy Review

iSeries (AS/400) Security - Policy Implementation

iSeries (AS/400) Security - Work Practice


<<back <<contact us