CHAPTER 6Securing Information Wherever It Lives

Most experts agree that a good security plan has three pillars: protection, detection, and reaction. You need to protect your information, you need to detect unauthorized access, and you need to react when you suspect a problem. In a pragmatic ECM system, you’ll need a combination of applications to implement a coherent information security policy.

The most vital application is a unified approach to user management. You need a centralized repository that manages passwords, access rights, and other user information. Most enterprises use some variety of centralized user management such as Microsoft Active Directory, or any number of enterprise Lightweight Directory Access Protocol (LDAP) solutions. ...

Get Transforming Infoglut! A Pragmatic Strategy for Oracle Enterprise Content Management now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.