Members of IT should know the company data security goals and objectives before implementing CA Top Secret Option for DB2. Your IT members must evaluate the existing security policy of the organization and determine whether you want to modify your existing policy before you implement CA Top Secret Option for DB2. Identify any areas of the policy that are unclear or inappropriate. Keep in mind the modifications that your team wants to make as you plan to implement CA Top Secret Option for DB2 security in your data center.
The first step in reviewing your security policy is to identify existing site security policies or standards. Because not every site has a formal security policy, start by identifying what has already been protected. Then, based on the implementation plan, identify the changes you must make in your current security policy. Note the differences in policy or functions of the features. During the implementation of CA Top Secret Option for DB2, you can change anything that you did not implement in CA Top Secret the way you originally wanted. Communicate any necessary changes to the user community by publishing a new security policy.
Many factors influence a site's policies and objectives. These can include the following areas:
After you evaluate existing security policies and standards, you must tailor your new security policy to accommodate DB2 requirements. If these policies and goals are not known or defined, the IT will find it difficult to choose appropriate CA Top Secret Option for DB2 options and to proceed quickly through CA Top Secret Option for DB2 implementation. Communicate the new policy to your user community to ensure that they know the new goals. You can use CA Top Secret Option for DB2 as a tool to implement security policies, automate policy enforcement, and help the company achieve its goals in relation to DB2 security.
As you begin tailoring the security policy, you must make decisions based on the following questions:
|
Copyright © 2011 CA Technologies.
All rights reserved.
|
|