Role Engineering for Enterprise Security Management

  • Authors:
  • Edward J. Coyne;John M. Davis

  • Affiliations:
  • -;-

  • Venue:
  • Role Engineering for Enterprise Security Management
  • Year:
  • 2007

Quantified Score

Hi-index 0.00

Visualization

Abstract

Whether you are a manager, engineer, or IT security specialist, this authoritative resource shows you how to define and deploy roles for securing enterprise systems. Written by leading authorities in the field, the book explains how you can build a business case, identify risks, determine project costs, and fully plan and staff a role engineering effort. You find practical techniques that meaningfully define roles and ensure proper assignment of permissions and roles to users. The book presents tools that enable you to capture permissions and user assignments from existing systems, and analyze user and permission data in scenarios simulating actual system use. Moreover, this practical reference helps you evaluate these tools and decide which ones are right for your own role engineering program. The book also shows how to verify that role structures comply with security policies. You find tips and insights from real-world projects that guarantee you engineer roles strategically and securely.