?
Solved

access governane

Posted on 2014-04-02
2
Medium Priority
?
283 Views
Last Modified: 2014-04-11
Can anyone recommend any books publications on how to implement best practice access governance and management   across an organasation regardless of what format and where the data is stored
0
Comment
Question by:pma111
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 26

Accepted Solution

by:
Leon Fester earned 1000 total points
ID: 39974451
Access governance and management is best implemented through the introduction of Role Based Access Control (RBAC).

I would refer to the SANS websites for information about governance and best practices.

http://www.sans.edu/research/security-laboratory/article/311
http://www.sans.org/reading-room/whitepapers/bestprac

I found a presentation that might help you see RBAC being introduced into a complex environment.
http://www.id-conf.com/files/kruit_abnamro.pdf

Also have a look at Identity and Access Management article information for better understanding of what's options you have available for governance and access management.
0
 
LVL 64

Assisted Solution

by:btan
btan earned 1000 total points
ID: 39974881
I will say delve into identity access management as a whole which covers the full identity lifecycle from its creation, usage, removal and oversight. A good kickstart is the GRC ecosystem which ISACA has established couple of article and publication too. maybe check this out for a start which include references that helps the understanding and planning to implementation an IAM program

http://www.isaca.org/Journal/Past-Issues/2011/Volume-5/Pages/The-Impact-of-Governance-on-Identity-Management-Programs.aspx 

Also we can tap on Gartner as well since they are also watching this space with even recommended reading (need registration)

https://www.gartner.com/doc/1698615/best-practices-identity-access-management

Sometimes, I may also look at MNC in this space actively pushing the practical side to deploy and operationalise the strategy. We should stay practical and map solution to just purely paper talk, and bonus is how it comply with standard and regulation e.g. PCI, SOX, etc

http://www.oracle.com/us/products/middleware/identity-management/061145.pdf
0

Featured Post

When ransomware hits your clients, what do you do?

MSPs: Endpoint security isn’t enough to prevent ransomware.
As the impact and severity of crypto ransomware attacks has grown, Webroot has fought back, not just by building a next-gen endpoint solution capable of preventing ransomware attacks but also by being a thought leader.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

The Cyber News Rundown brings you the latest happenings in cyber news weekly. Who am I? I’m Connor Madsen, a Webroot Threat Research Analyst, and a guy with a passion for all things security. Any more questions? Just ask.
Article by: Justin
In light of the WannaCry ransomware attack that affected millions of Windows machines, you might wonder if your Mac needs protecting. Yes, it does and here is how to do it.
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, just open a new email message. In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, Just open a new email message.  In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
Suggested Courses
Course of the Month9 days, 19 hours left to enroll

762 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question