Security Notification Policies

When you need to monitor access to your most important data

Why You Need Them!

This new and evolving family of Target-Driven policies are centered around Security with a direct eye on Data Access Governance. These policies allow granular application of control and monitoring to be applied directly in support of appropriately securing high-value-target data.

 

Alt

Data Access Governance

Notification polices allow designated business data owners to be notified of direct or indirect changes involving who can access designated data and the details of those changes.

Alt

Mitigate Risk

Notifications of changes in access to important data allow you mitigate the risk of malicious or unintentional changes to data or data leaks. 

Alt

Reduced Productivity

Not only is it important to know when someone is given access to data but also when someone loses access. It should generally be intentional but it could also be by mistake. This leads to people not being able to access the data they need.  Making them less productive. 

Alt

Compliance

Getting the people that own the data in your organization involved in the stewardship of their data and keeping them apprised of the evolution of security is a goal that most aspire to.


Mulit-Level Security Change Notification

 

Notification polices allow designated business data owners to be notified of direct or indirect changes involving who can access designated data and the details of those changes.

These policies can help you and the data owner, whether you/they are worried about:

  1. People gaining access they should not have
  2. People losing access to data that they need

The first of these are notification policies allow designated data owners to be notified of:

  • Direct or indirect changes involving who can access designated data
  • The details of those changes

 

Direct access changes involve permissions modification while indirect change may involve changes in role in the identity system itself. Both of these levels ultimately impact who can access the data and the Data Owner may want to know about these changes