These individuals are involved with developing the business software required within the corporate environment. As part of their function, they are required to access only those resources which comprise their application and some globally accessible system resources. Initially, there may be a fear of CA Top Secret. The classically curious applications people, who like to roam unbridled through system resources, feel threatened that their curiosity is being thwarted. But these individuals are usually the exception, and must not be nosing around as part of their job function.
Actually, these areas may welcome CA Top Secret if they are properly educated in its use. CA Top Secret provides an applications interface which allows the applications areas to use the security system to provide additional application security needs. This gives the applications area a tool to simplify design wherever additional security is required. This also gives the security administration area the opportunity to eliminate the homegrown application security systems and to centralize all security requirements as well as to standardize security administration.
Each application requires different security definitions so protecting this area may be a slow process. Each application design must be evaluated for effective protection, and the security administrator is well advised to involve the affected application area in the security definition process.
|
Copyright © 2014 CA Technologies.
All rights reserved.
|
|