It is more effective if individuals in your organization monitor the security program in their area, than if the security administration area or security project team is solely responsible for this activity. You also have a better chance of a solid security implementation if the entire organization is behind it.
There are a number of functional areas involved in the use of the security product and it is an important step to create willing users of the product. This is not as difficult as you may think, but it does take time and careful security implementation planning. The functional areas most often involved include: the systems software area, the applications area, operations, the auditors, and the applications end-users. Each area is discussed in relation to why they may be opposed to security, why their cooperation must be cultivated, and how that cooperation may be cultivated.
|
Copyright © 2014 CA Technologies.
All rights reserved.
|
|