Have You | Yes/No |
Identified all of the key players? | |
Obtained management buy-in (at all levels)? | |
Collected all applicable system and database information? | |
Identified the specific types of accounts required for each system—both operating system and database? | |
Determined who will have authority to approve accounts? | |
Determined who will create/delete/manage accounts? | |
Determined a user tracking method and implementation? | |
Decided how account approval will be performed: email, web site, hard-copy form, etc.? | |
Identified all affected applications on each system? | |
Identified a username and password structure? | |
Determined what constitutes a security breach and the appropriate penalty for each breach? | |
Identified all sensitive data on the system and created methods to protect that data? | |
Determined what forms of monitoring will be used? | |
Determined what forms of backup will be used? | |
Created recovery procedures to be followed? | |
Determined the required availability for the database? | |
Established standards for views and roles? | |
No comments:
Post a Comment