본문 바로가기

Working/IT Governance

Security Controls for Sarbanes-Oxley Section 404 IT Compliance



사용자 삽입 이미지
Wiley Publishing
Security Controls for Sarbanes-Oxley
Section 404 IT Compliance

Authorization, Authentication,and Access

Dennis C. Brewer

Chapter 1 The Role of Information Technology Architecture in Information Systems Design
Chapter 2 Understanding Basic Concepts of Privacy and Data Protection
Chapter 3 Defining and Enforcing Architecture
Chapter 4 Combining External Forces, Internal Influences, and IT Assets
Chapter 5 Simplifying the Security Matrix
Chapter 6 Developing Directory-Based Access Control Strategies
Chapter 7 Integrating the Critical Elements
Chapter 8 Engineering Privacy Protection into Systems and Applications
Chapter 9 The Value of Data Inventory and Data Labeling
Chapter 10 Putting It All Together in the Web Applications Environment
Chapter 11 Why Federated Identity Schemes Fail
Chapter 12 A Pathway to Universal Two-Factor Authentication

Appendix A WWW Resources for Authentication, Authorization, and Access Control News and Information
Appendix B Important Access Control and Security Terms
Appendix C Critical Success Factors for Controls Design
Appendix D Sample Policy Statements for Compulsory Access and Security Controls
Appendix E Documentation Examples
Appendix F Sample Job Description for Directory Engineer/Schema Architect