Abstract [eng] |
Security of information and information technologies – that’s a collection of tools and solutions to reach the highest possible security level to protect the most valuable resource – information. Because of many different external and internal factors there is constant threat for this asset to be modified, leaked or deleted. The security is never only physical perimeter protection, it is a combination of physical and cyber security, and only this kind of approach could help organization stick to CIA model. Despite all the security software and hardware out there in the market, there are also sets of best practices which provide great value if implemented properly. Many IT security professionals agree that well implemented information security policy is crucial for any organization. Unfortunately, not everyone is prepared to handle this kind of task because of its complexity, confrontation with business model, lack of specialists and so on. Moreover, it has to be well maintained and audited, so it is important to solve similar issues by using automation where possible. That could save effort and money for business. Access security policy is fundamental for all the security policy, so it would give a great value if organization could implement at least that one. So automatization of the process would let many other organizations have this implementation finally available and that could be a great start to take care of information security. |