Security, Networking infrastructure
Data Access Governance Best Practices - Part 1 of 2
Data Access Management
Best Practices for Data Access Management:
- Create a complete inventory of your users and resources and keep it up to date.
- Work with department managers and other business owners to determine where your sensitive data is and who owns it.
- Determine who has access to what and who owns what data in your organization. For example, you can export access lists of your file servers using PowerShell scripts or third-party software.
- Establish a security structure by creating security groups and making users members of the appropriate groups.
- Assign each group appropriate access to shared data.
- Empower data owners to control access rights to the data they own.
- Audit the actions of data owners to be sure that all operations are authorized.
- Establish an access request workflow (such as a request portal) so users can easily request access to data they need to do their jobs.
- Audit and report on access to sensitive data as well as changes to it.
- Make all sensitive shares hidden by adding a dollar sign ($) to the end of each share name.
- Run an access certification program to align access with business needs.