iSeries
(AS/400) Security - Policy Creation
A security policy is the corner stone that insures your company's data is secured
properly. ATS's first task is to understand your business and identify data
that requires controlled access and protection not only from intentional damage
but, as in most cases, accidental damage. Once all key data has been identified
and its sensitivity defined, access to servers and applications can be detailed.
A security policy is not just about insuring correct access, or prevention
from intentional damage; it is also about helping to insure availability. If
systems that data and applications reside on are not considered in your security
policy, a system outage accidental or otherwise can cause loss of data, or applications
to be unavailable for a period of time.
Deliverables:
Servers, Applications and Data are defined and their purpose documented
Policy defining access to Servers, Applications and Data at all levels
Policy defining authority to Servers, Applications and Data at all levels
Benefits:
Defined security policy based on business requirements
Relevant levels of access and authority are defined
Clear understanding of required levels of access and authority is gained
iSeries (AS/400) Security - Policy Review
iSeries (AS/400) Security - Policy Implementation
iSeries (AS/400) Security - Work Practice
<<back <<contact
us
|