• Create BookmarkCreate Bookmark
  • Create Note or TagCreate Note or Tag
  • PrintPrint
Share this Page URL
Help

Chapter 12. Implementing Security > Developing a Security Plan

Developing a Security Plan

Like the security assessment, a security plan needs to be developed after the structure of the database system is known. For existing systems, the structure is already known, but for new systems, the security plan needs to wait until the system structure plan is complete. As soon as all the tables and field structures have been determined, then you can go through that structure and determine the different levels of access that need to be used with each table and field.

System roles often match up well to job titles in an organization, but it often happens that two people with the same title need to have different roles within the system. Job titles are a good starting point for developing user categories, but don't overlook role differences just because two people have the same title.


PREVIEW

                                                                          

Not a subscriber?

Start A Free Trial


  
  • Creative Edge
  • Create BookmarkCreate Bookmark
  • Create Note or TagCreate Note or Tag
  • PrintPrint