The Information Protection Life Cycle and Framework: Control Access
Content of Figures
1 Executive Summary
The Information Protection Life Cycle (IPLC) and Framework describes the phases, methods, and controls associated with the protection of information. ...
Login Free 30-day Select Access Get full Access2 Analysis
The three stages in the life of information objects are: acquire & assess, active use life, and disposition.
Active Use Life
Active Use Life is a ...
Login Free 30-day Select Access Get full Access3 Recommendations
Access control is still on the frontier of identity management and cybersecurity. KuppingerCole has research addressing Access Management and Secur ...
Login Free 30-day Select Access Get full Access4 Related Research
Advisory Note 72565 Big Data Security, Governance and Stewardship
Advisory Note 70285 Enterprise Role Management Done Right
Advisory Note 72611 Unifying RBAC and ABAC in a Dynamic Authorization Framework
Advisory Note 72564 Security Organization, Governance, and the Cloud
Leadership Brief 80204 Identity Fabrics – Connecting Anyone to Every Service
Leadership Brief 80109 Data Security and Governance for Big Data
Leadership Brief 80196 Access Reviews Done Right
Leadership Compass 70966 Dynamic Authorization Management
Leadership Compass 71145 Access Governance and Intelligence
Leadership Compass 79011 Adaptive Authentication
Leadership Compass 70614 Cloud Access Security Brokers
Whitepaper 79046 Governance for All, Get a Grip on Unstructured Data
Whitepaper 72613 Protecting Your Keys to the Kingdom Against Cyber-attacks and Insider Threat