Your Browser is not longer supported

Please use Google Chrome, Mozilla Firefox or Microsoft Edge to view the page correctly
Loading...

{{viewport.spaceProperty.prod}}

Security policy

Security, i.e. ensuring the confidentiality and integrity of stored information, is an important aspect in today’s dp and SQL systems.

A distinction is made between the following security criteria:

  • System access control (identification, authentication)
    Users must be identified and authenticated before interaction can begin.

  • Data access control (administration of rights, verification of rights)
    The system must manage access rights between users (subjects) and objects. Each time users attempt to access objects which are subject to administration of rights, the operating system must check whether they are authorized to do this. Unauthorized access attempts must be rejected.

  • Logging
    The system must contain a logging component which is able to log events which are relevant to security.

  • Reprocessing
    Before being reused by other users, sensitive stored objects must be processed in such a way that no conclusions can be drawn about their previous content.

General information on the subject of security in dp systems and information on security in BS2000 is provided in the “ SECOS (BS2000)” manual.

The security officer of the dp system and the SESAM/SQL administrator must use the protective mechanisms of the dp system, in other words of BS2000, and of SESAM/SQL to develop a security policy which offers the required security and permits regular checks. The protective mechanisms of BS2000 are described in the ” SECOS (BS2000)” manual; the protective mechanisms of SESAM/SQL are described in this chapter.

The SESAM/SQL database system includes a wide range of protective mechanisms for effective data protection.