Previous Topic: ExamplesNext Topic: Defining Resource Ownership


Do Not Delay File Design

It is often tempting to ignore designing a file structure as a first step in creating the Security File. Some organizations have overlooked this first step and have begun to define ownership and users within one large department without taking the time to analyze and design the breakdown of access requirements as they relate to the organizational chart. They later find themselves creating an ad hoc structure to respond to special decentralization requirements that results a file design without any real structure or forethought.