- ホーム
- > 洋書
- > 英文書
- > Computer / General
Full Description
Role engineering secures information systems. It ensures that every user has the right permission to access just the right information, computers, and networks. When hundred or thousands of computer users must be assigned their own individual access permission, role engineering saves significant time and money while protecting data and systems. This first-of-its-kind book illustrates the entire role engineering process, from project planning to deployment and verification. In addition to explaining technical aspects, the book emphasizes business benefits by showing how to manage risks and costs. Practitioners get proven techniques that define roles and ensure proper assignment of permissions and roles to users. The book also shows how to verify that roles comply with security policies.
Contents
The Business Case for Role-Based Access Control. Role Engineering in the Phases of the System Development Life Cycle. Role Engineering and Why We Need It. Staffing for Role Engineering. Defining Good Roles. Two Approaches to Defining Roles. Designing the Roles. Engineering Permissions. Tools that Can Be Used to Assist the Role Engineering Process. Putting It All Together. What Others Have Been Doing. What Can Go Wrong and Why. Planning a Role Engineering Effort.