IT Security Policy Management Usage Patterns Using IBM Tivoli Security Policy Manager
In a growing number of organizations, policies are the key mechanism by which the capabilities and requirements of services are expressed and made available to other entities. The goals established and driven by the business need to be consistently implemented, managed and enforced by the service-or...
Gespeichert in:
Hauptverfasser: | , , , , , , , , , |
---|---|
Format: | Buch |
Sprache: | eng |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
Zusammenfassung: | In a growing number of organizations, policies are the key
mechanism by which the capabilities and requirements of services
are expressed and made available to other entities. The goals
established and driven by the business need to be consistently
implemented, managed and enforced by the service-oriented
infrastructure; expressing these goals as policy and effectively
managing this policy is fundamental to the success of any IT and
application transformation.First, a flexible policy management framework must be in place
to achieve alignment with business goals and consistent security
implementation. Second, common re-usable security services are
foundational building blocks for SOA environments, providing the
ability to secure data and applications. Consistent IT Security
Services that can be used by different components of an SOA run
time are required. Point solutions are not scalable, and cannot
capture and express enterprise-wide policy to ensure consistency
and compliance.In this IBM® Redbooks® publication, we discuss an IBM
Security policy management solution, which is composed of both
policy management and enforcement using IT security services. We
discuss how this standards-based unified policy management and
enforcement solution can address authentication, identity
propagation, and authorization requirements, and thereby help
organizations demonstrate compliance, secure their services, and
minimize the risk of data loss.This book is a valuable resource for security officers,
consultants, and architects who want to understand and implement a
centralized security policy management and entitlement
solution. |
---|