Your CA Top Secret Security File maintenance procedure can be designed for quick response. The procedure can be designed in such a way that the requestor receives a quick turnaround for the request. If quick response is not practical, then the turnaround time for requests is communicated and understood by all user areas so that they can effectively plan for timely Security File revisions. Of course, emergency procedures must be available for immediate response when required.
The ability of a central security administration staff to respond quickly to maintenance requests may determine whether or not you choose to decentralize CA Top Secret security maintenance. If certain areas require more timely response than is possible at the central level, you may choose to decentralize maintenance for those areas. Of course, if you have properly designed your Security File such that the problem areas are already divisions or departments, decentralization is simple.
|
Copyright © 2014 CA Technologies.
All rights reserved.
|
|