in

Quest Releases 6 Steps for Guiding and Improving Data Access Controls

Quest Releases 6 Steps for Guiding and Improving Data Access Controls - top government contractors - best government contracting event
https://executivebiz-media.s3.amazonaws.com/2022/08/19/30/9f/c3/a0/b7/6f/d4/64/Executive-Biz.png

Quest Releases 6 Steps for Guiding and Improving Data Access Controls - top government contractors - best government contracting eventQuest software has just released its six steps for guiding assessments and improving data access controls. Those steps include:

  1. Discover Users and Resources ““ The first step involves an infrastructure inventory of important data, which can and often does reside on multiple platforms, Network-Attached Storage devices, SharePoint sites, Active Directory group memberships, mobile computing devices, etc. In particular, it“™s also important to identify the resources of unstructured or orphaned data.
  2. Classify Data and Assign Rights ““ Data must be classified in terms of confidentiality, correlation to regulations, overall relevance and archive requirements. Appropriate owners of business data should be reviewed and assessed to ensure they are in accordance with security policies.
  3. Assign Data Owners and Approvers ““ Assign appropriate business owners based on roles, locations and other attributes. Separation of duties must be taken into consideration to assure compliance and security.
  4. Audit and Report on Access ““ Schedule and perform continuous business-level attestation of access to ensure accuracy, compliance and security.
  5. Automate Access Requests & Problem Remediation ““ Automating access fulfillment workflows based on access rights and the requestor“™s role in the organization is ideal for security purposes; also, automated responses that remediate deviations can proactively prevent potential threats or breaches.
  6. Prevent Unauthorized Changes ““ Lock down certain data, groups or access rights that should never be altered; all changes should be logged in a secure depository that cannot be manipulated to ensure a high level of forensics analysis.

“Our view of end-to-end data access governance blends discovery, control and automation to help business decision-makers determine who needs access to business critical data, whether it resides in structured formats within applications and databases or in unstructured formats within documents and spreadsheets, in order to meet ever-evolving business demands without compromising security or compliance requirements,” said Nick Nikols, vice president and general manager of Identity, Security and Windows Management at Quest Software.

ExecutiveBiz Logo

Sign Up Now! ExecutiveBiz provides you with Daily Updates and News Briefings about Industry News

mm

Written by Admin

Intel Subsidiary Platform Enables Rockwell Collins SecureOne Products - top government contractors - best government contracting event
Intel Subsidiary Platform Enables Rockwell Collins SecureOne Products
EMC Scale-Out Storage Deployed at Univ. of Utah - top government contractors - best government contracting event
EMC Scale-Out Storage Deployed at Univ. of Utah