User Authorization, Identification, & Authentication Policy

Author(s): Sean Burkett

1 Download

Get Instant Access
To unlock the full content, please fill out our simple form and receive instant access.

This policy ensures that users are authorized before being given access to information systems, where feasible federated identity mechanisms should be used to integrate access controls of cloud services and mobile devices with internal systems.

Risks Addressed by Policy:

  • Information systems could be accessed illicitly.
  • Security of information systems can be compromised.

View the Complete Blueprint:

Develop a Five Year Data Architecture Plan

Secure your footings in data to lay a foundation that will withstand the winds and rain of today's IT disruptors.

Related Content

Visit our IT Cost Optimization Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019