Previous Topic: About Naming StandardsNext Topic: Security Maintenance Procedures


Procedures for Handling Violations

A pattern of unauthorized access attempts by a user (or group of users) could indicate that these users are looking for a loophole in your security definitions. If they find the loophole, this will not show up as a violation. Therefore, a pattern of attempts might indicate a potential breach of security and should not be ignored or taken casually.

If employees sense that no one is monitoring violation attempts, they might be encouraged to try to access resources that they should not.

To handle excessive violations: