There are certain fields in the warehouse that are of a sensitive nature (i.e., credit card numbers). What is the most common/best practice method of loading these fields but having a reasonable amount of security to prevent their misuse?
Douglas Hackney's Answer: Your information security is only as good as your people, the distance to the nearest Xerox machine and the capacity of their briefcases. I think it is especially important to realize that the most dangerous thing is not the potential theft or misuse of data, but of the false sense of security a technological solution engenders. In terms of a technological approach, your baseline defense is still your database security. Tool level security should be viewed warily. Centralize your management around your global meta data repository.
Register or login for access to this item and much more
All Information Management content is archived after seven days.
Community members receive:
- All recent and archived articles
- Conference offers and updates
- A full menu of enewsletter options
- Web seminars, white papers, ebooks
Already have an account? Log In
Don't have an account? Register for Free Unlimited Access