|
REAL WORLD SUCCESS STRATEGIES
FOR ROLES AND ACCESS CONTROL
In today’s enterprise, authorization
or access management is a vital part of
an infrastructure, but few are doing more
than patchwork on systems.
This Cross-Cutting Concern will
address:
- SOA applications that
present a new authorization model that
IdM infrastructures must support
- Standards: XACML vs. ISO
REL and others
- Fine Grained Auditing
(FGA) will deal with challenges such as
centralizing policy definitions, coordinating
policy distribution, and processing complex
authorization decisions
- An understanding of business
process and organizational dynamics in
correlation with business, security, and
legal policies within IdM and security
control systems
- Real world methodologies,
case studies and discussions that provide
successful strategies for developing roles
or other policy structures
- How instant messaging
will devolve into a noisy nuisance and
critical business risk if enterprises
don’t exploit roles and access control
for real-time communications
- The possibility of purchasing
a client or server OS, in two years, that
doesn’t include deeply pervasive,
role-based ACLs
|