Managing Access in an Enterprise Environment

Contributed by Marc Colonna
Access control starts with the front door to the organization, continues with appropriate security in and outside of the data center, and finishes with good user education. Strong and competent companies will employ the appropriate security standards deemed necessary for their organization. “If your data could be of any value to someone without proper authorization to access it, then your organization needs strong access control” (Martin, 2018). Physical security such as security cameras and security doors are only as functional as the habits of those who are using them. Control over network access and network resources must be suitable for the data it is protecting. Policies are required to keep these systems in balance and always improving as technology changes.
This document is in PDF format. To view it click here.

Rate this article: 
No votes yet