Your step-by-step guide to creating authentication processes that assure compliance
To comply with Sarbanes-Oxley Section 404, you must design an information technology infrastructure that can protect the privacy and access integrity of your data, particularly online, while not restricting business activity. This book shows you how to do that, explaining what you need to know every step of the way.
Recognize eight concepts that constitute privacy of information
Apply the security basics—identification, authentication, authorization, access control, administration, auditing, and assessment
Use features already present in directory technology, directory schema, and meta-synchronization to improve security profiles
Integrate a security architecture into legacy, current, and future applications
Create security domain definitions that will stop data predators cold