Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Organisation, roles, responsibilities (generic introduction)

 

AAI processes and procedures, FIM, SSO

 

Setting up an overall authentication and authorization infrastructure is a comprehensive task already. A lot of processes have to be defined, setup and managed.  Those processes become much more complicated when dealing with collaborative environments. Here several partnes with their own authentication systems policies and procedures have to agree on common principles and procedures. Federated Identity Management (FIM) will come into the game and since the user doesn’t want to authenticate several times at different systems a global single-sign-on (SSO) solution would be preferable.

...

  • Hot Topic Phishing and Tips for using e-mail
  • Secure passwords and Tips for using passwords
  • Viruses and Trojans and Protection against them
  • Advice for securely using cloud services and social networks
  • IT security at home and while travelling

 Developing Developing and maintaining policies and procedures

 Applying Applying policies and procedures

 System System acquisition

 Decommissioning Decommissioning (data leakage prevention)

Setting up a system is straight forward, but decommissioning the system might become much more complex. It is not just turning off power. System decommissioning includes freeing the system of any user data by providing processes how to do those transfers and setting up a logical time schedule for doing so. Any priviledges offered have to be withdrawn, disk drive content has to be deleted in a professinal manner etc.

The training should give an overall overview about the tasks to be fullfilled by system admins on the system itself as well as the tasks to put in place for freeing organisational ressources, e.g. deleting user info in AAI infrastructures etc.

 Risk management