Defining your security requirements

Security requirements are normally an afterthought within a business intelligence and data warehouse solution. It is important to gather this information during requirement gathering so that the business has an understanding of how information is required to be secured, and the project can develop a suitable solution.

Getting ready

Identify any security or governance information within the business which can guide the requirements for security. There are normally three levels of security:

  1. Authentication: Validate whether the user is who they say they are, and have a valid password.
  2. Authorization: Identify the role of the user, and map the role to content which the user has access.
  3. Data: Interpret the role and ...

Get Business Intelligence Cookbook: A Project Lifecycle Approach Using Oracle Technology now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.