Previous Topic: How a Security Model Is Established

Next Topic: How Organization and Resource Requirements Are Established

How a Security Model Requirements Table Is Created

When completing each phase of the security model design methodology, use a table similar to the one shown below to organize your information. Once you have completed the columns in this table, you can use the information to build SiteMinder security policies.

Resource

Role

Task

Access

Implementation

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

The following sections describe how to gather information to complete this table.