Security Policy
Security Policy
Security Policy
Here, security does not mean prevention of data loss due to technical failure, but preventing unauthroized access to data. Critical and confidential data is always a potential target for data abuse. But this is not the only threat. It is not that uncommon that not properly protected data is accidentally corrupted or lost, that is why a sound security policy is a must.
Talking about security policy is relevant in a networked environment and with large amounts of data, all of which should not be accessible to everyone. Security should be planned, in order to determine which users have access to which information, and which operations they can perform. Steps in making a security plan:
1. Make a list of all objects and actions that should be monitored.
2. Make a list of all users and user groups.
3. Draw relations between the two lists.
Based on the results, implement the security policy in PANTHEON.
 |
To prevent access through domain accounts, PANTHEON creates a SQL Server login for each PANTHEON user, but one that is different from the domain account. See SQL Server Logins in PANTHEON. |
 |
A domain account and PANTHEON user account can be linked, so that successful domain login will allow the user to logon to PANTHEON without entering a password. See Automatic Domain User Logon. |