Publication Cover
EDPACS
The EDP Audit, Control, and Security Newsletter
Volume 43, 2011 - Issue 3
52
Views
0
CrossRef citations to date
0
Altmetric
Original Articles

Provisioning Process: A Discussion

Pages 1-8 | Published online: 30 Mar 2011
 

Abstract

Abstract. This article discusses some of the Information Technology account provisioning issues currently faced by small- and medium-sized businesses and lays out a strategy for a streamlined provisioning process. These will be the first steps required to move toward automating the provisioning process with an Identity Management strategy.

Notes

“Excessive access creates the potential risk for people to make uncontrolled changes to critical systems.”

“Access to Systems should be based on a business need and only personnel who are formally authorized should have access.'

“A ghost account is an account that should not remain active on a System but is.”

“By having an accurate and complete picture of a user's entitlements, it will be a much easier process to track the removal of a user's accounts and track the return of assets.”

“The Authoritative Source is a single repository that is considered the primary location that contains the most accurate information about a user's identity.”

i. Gene Kim, Paul Love, and George Spafford, Visible Ops Security: Achieving Common Security and IT Operations Objectives in 4 Practical Steps (IT Process Institute Inc., 2008), p. 34.

ii. Gerry Gebel, Identity and Privacy Strategies—Reference Architecture Template - Provisioning Services (Burton Group, 2009), p. 3.

iii. Ibid., p. 7.

iv. Kim, Love, and Spafford, p. 35.

v. Ibid., p. 34.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.