Login Security

All the precautions were placed on the network, the architecture supports the business plan and security policy, and the facilities are physically secure. Finally, here we are at the front gate. The front gate is where the user or the service identifies themselves and presents some type of credentials to request entry. The failure to have good login policies in place is like building the best nuclear submarine but using a screen door for a hatch.

Login Requirements and Procedures

The first thing that should be expected of any login sequence is to identify who is requesting access. Regardless of the protocols used, you need to know who is trying to access network services—or in some cases, who they want the network services ...

Get Writing Information Security Policies now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.