You might feel that since CA Top Secret is stopping unauthorized access attempts, there is no need to monitor the employees incurring the violations. But a pattern of unauthorized access attempts by a user or a related group of users may indicate that these users are looking for a loophole in your security definitions. If they find the loophole, this does not show up as a violation. Therefore, a pattern of attempts might indicate a potential breach of security and they must not be ignored or taken casually.
If employees sense that no one is monitoring violation attempts, they might be encouraged to try to access resources that they know they do not have access to.
|
Copyright © 2014 CA Technologies.
All rights reserved.
|
|