

Security Administration Function › Set-up and Maintenance Dependencies
Set-up and Maintenance Dependencies
In any decision regarding who is to handle security administration, consider the amount of setup and maintenance activity required. This activity depends on:
- The number of corporate entities, such as departments, divisions, applications.
- The number of defined users, as well as employee turnover requirements.
- The number of data processing resources to be protected.
- The existence of standards; standards are discussed later in detail.
- The different kinds of facilities to be protected, and the extent of security required on each.
- The number of hardware entities to be protected. For example, if terminal protection is used heavily and regular network reconfiguration is a fact of life, security maintenance based on terminal ID revisions are heavy.
- The application development activity. If heavy development is being pursued, the security requirements for maintenance activity and security review activity must be considered for new and revised application segments.
- Auditing requirements and frequency of change to them.
- The number of special routines requiring user‑defined resources, and the maintenance activity against them.
Copyright © 2010 CA Technologies.
All rights reserved.
 
|
|