Use Access Rules to Protect Data

Ideally, all data access should occur through a Service-Oriented Architecture that will have its own access rules. Data should not be directly accessible except through other processes that own the data. This practice will help prevent unauthorized access or its accidental destruction.

For best practices on modeling, see Chapter 8, Agile Modeling.




Practical Guide to Enterprise Architecture, A
A Practical Guide to Enterprise Architecture
ISBN: 0131412752
EAN: 2147483647
Year: 2005
Pages: 148

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net