iSeries 
  (AS/400) Security - Policy Creation 
A security policy is the corner stone that insures your company's data is secured 
  properly. ATS's first task is to understand your business and identify data 
  that requires controlled access and protection not only from intentional damage 
  but, as in most cases, accidental damage. Once all key data has been identified 
  and its sensitivity defined, access to servers and applications can be detailed. 
A security policy is not just about insuring correct access, or prevention 
  from intentional damage; it is also about helping to insure availability. If 
  systems that data and applications reside on are not considered in your security 
  policy, a system outage accidental or otherwise can cause loss of data, or applications 
  to be unavailable for a period of time.  
Deliverables: 
 Servers, Applications and Data are defined and their purpose documented 
   
   Policy defining access to Servers, Applications and Data at all levels  
   Policy defining authority to Servers, Applications and Data at all levels  
   
 
 Benefits: 
 Defined security policy based on business requirements  
   Relevant levels of access and authority are defined  
   Clear understanding of required levels of access and authority is gained  
 
 iSeries (AS/400) Security - Policy Review 
 iSeries (AS/400) Security - Policy Implementation 
 iSeries (AS/400) Security - Work Practice 
  
 <<back <<contact 
  us 
 |