IT Security Policy Management Usage Patterns Using IBM Tivoli Security Policy Manager

IT Security Policy Management Usage Patterns Using IBM Tivoli Security Policy Manager

4.11 - 1251 ratings - Source

In a growing number of organizations, policies are the key mechanism by which the capabilities and requirements of services are expressed and made available to other entities. The goals established and driven by the business need to be consistently implemented, managed and enforced by the service-oriented infrastructure; expressing these goals as policy and effectively managing this policy is fundamental to the success of any IT and application transformation. First, a flexible policy management framework must be in place to achieve alignment with business goals and consistent security implementation. Second, common re-usable security services are foundational building blocks for SOA environments, providing the ability to secure data and applications. Consistent IT Security Services that can be used by different components of an SOA run time are required. Point solutions are not scalable, and cannot capture and express enterprise-wide policy to ensure consistency and compliance. In this IBMAr RedbooksAr publication, we discuss an IBM Security policy management solution, which is composed of both policy management and enforcement using IT security services. We discuss how this standards-based unified policy management and enforcement solution can address authentication, identity propagation, and authorization requirements, and thereby help organizations demonstrate compliance, secure their services, and minimize the risk of data loss. This book is a valuable resource for security officers, consultants, and architects who want to understand and implement a centralized security policy management and entitlement solution.For a concrete cloud computing example, suppose a relatively small organization that hosts a service online experiences an unanticipated spike in ... In this case, the service provider organization would need to protect its own information using context-based access control and cryptography to ensure ... authorized to see.

Title:IT Security Policy Management Usage Patterns Using IBM Tivoli Security Policy Manager
Author: Axel Buecker, Scott Andrews, Craig Forster, Nicholas Harlow, Ming Lu, Sridhar Muppidi, Trevor Norvill, Philip Nye, Günter Waller, Eric T. White, IBM Redbooks
Publisher:IBM Redbooks - 2011-10-26

You must register with us as either a Registered User before you can Download this Book. You'll be greeted by a simple sign-up page.

Once you have finished the sign-up process, you will be redirected to your download Book page.

How it works:
  • 1. Register a free 1 month Trial Account.
  • 2. Download as many books as you like (Personal use)
  • 3. Cancel the membership at any time if not satisfied.

Click button below to register and download Ebook
Privacy Policy | Contact | DMCA