We have now discussed the first two A’s: Authentication and Authorization. The third A stands for Accountability which establishes the reasons and source for changes, activations, additions, deactivations and deletions. This is accomplished by means of audit trails and logs that identify Who, What and When.
Some accountability processes such as policies and tickets also document the reasons why actions are performed, what changes are made and by what authority they are approved. Accountability is a significant and vital requirement for security and risk mitigation.
Each of the previous articles gave attention to the role and importance of Accountability.READ MORE >>
When a user logs in to a system, the first action that system will take will be to Authenticate or identify that user. As discussed in the first article of this series, Authentication to systems and applications s often done by means of a unique userid and password. Once authenticated, the next step is to determine what the user is authorized to perform.
The authorization process actually begins before a user ever logs in or even has a login to a system. One of the most useful methods for defining and managing authorization is an employee’s job description.READ MORE >>
In this series of articles, I want to discuss security best practices for your contact center: the triple A’s of security–Authentication, Authorization and Accountability. inContact can be a part of your security strategy, and the first article will discuss best practices for user authentication of agents and supervisors in your contact center.
Authentication is the process or processes by which the identity of an individual is verified. Identification of an individual actually begins during the hiring process. When looking at risk mitigation, verification of name and address are just the beginning. Employers commonly mitigate risk by hiring persons who are legal residents and whose background and history indicate reliability and capability.READ MORE >>