Corporate Philosophy on Security |
Configuration of the Operating Systems by Divisions |
Configuration of the Databases for each System by Division |
Configuration of Applications by Database and System for Each Division |
Configuration of Single Sign-on Utility |
Composition of Certificates of Authority |
USERID Guidelines for a Database Account |
USERID Guidelines for an Operating System Account |
Password Guidelines for a Database Account |
Password Guidelines for an Operating System Account |
Operating System Access Types |
Database Access Types |
Authorization for Establishment of User Accounts |
Establishing a USERID for a Database |
Establishing a USERID for an Operating System |
User AdministrationAccounts Creation |
User AdministrationAppropriate Roles by Application |
User AdministrationAppropriate Views by Application |
User AdministrationAdministrator Privileges |
User Administrationfor Applications |
Establishing Access to an Application |
Revoking Access to an Application |
Revoking Access to an Application for People Who Leave the Company |
Removing Access to a USERID for an Operating System Account |
Removing Access to a USERID for a Database Account |
Notification of Termination |
Revoking Access for Abruptly Terminated Employees |
Transferring Staff to Another Group Within a Division |
Transferring Staff to Another Group Outside of a Division |
Reinstating a USERID |
File Security Guidelines |
Restricting Access to Systems |
Restricting Access to Databases |
Security Audits for Operating Systems |
Security Audits for Databases |
Time Schedule for Security Plan Reviews |