|
Certification Path
Features
Security Policy
Security Organization
Asset Classification
Personnel Security
Physical & Environmental
Communications & Operations
Access Control
Systems Development
Business Continuity
Compliance
Services
Process
Technology
Tech Support
Automation Path
Demo
|
|
Access control is a huge effort to implement, co-ordinate and control. While the appropriate technology can control access to your networks, applications, operating systems and other assets, having the best technology protection is useless if it is not properly controlled, configured and used. You may have the most impenetrable access ways, but how can you be sure that your administrators don't leave them open or your employees don't give away their keys?
With the ISO17 application, you ensure administrators know how to use your technology and limit access accordingly. In turn, users learn how to access information properly and you have tools to record, track and review system use data. Since your access control is only as good as the knowledge of those who implement it, you can ensure there are no gaps in your communication lines.
Automated, online collaboration on user and network access and control, system monitoring and remote use procedures, processes and policies
Template policy and procedure guidelines to ensure that all elements of access control requirements are addressed
Easy access to descriptions of assets, security attributes of network services and control objectives for planning appropriate policies and procedures
Automated document control to ensure use of most current versions of access control procedures by employees
Training tools to aid implementation of your access policies and track employee responsibilities and education
Automated tools for monitoring and tracking system use
Streamlined process for conducting and recording meetings to review documentation and system use and training data
Powerful audit tools for ensuring controlled access to assets
|
|