Security basics, part 5 – How?

Overview You’ve gotten this far so let me wrap this series up for you. Why – Why someone tries to access the environment? Who – Who should be able to access the environment? Can we authenticate the users or identify them in another way? Where – Where are the users connecting from? From the office Security basics, part 5 – How?

Security basics, part 4 – When?

Overview Glad you’re with us still, this one is a bit shorter. Why – Why someone tries to access the environment? Who – Who should be able to access the environment? Can we authenticate the users or identify them in another way? Where – Where are the users connecting from? From the office network? Some Security basics, part 4 – When?

Security basics, part 3 – Where?

Overview Now that we’ve discussed about who, we can move to the next one, which is where? In this post I’m trying to stay more on the conceptual level and bearing in mind that the audience remains the same. Topics Why – Why someone tries to access the environment? Who – Who should be able Security basics, part 3 – Where?

Security basics, part 2 – Who?

Overview Let’s continue on the basics and scratch the surface a bit harder this time :). The post get’s a bit more technical and has some acronyms in it, but still very much on high level. Applying these measures requires a better understanding of who, where, when and how. Topics Why – Why someone tries Security basics, part 2 – Who?

Security basics, part 1 – Why?

Overview This series discusses on the security on higher level so it doesn’t get too technical and is aimed for IT service owners and decision-makers. Focus is on prevention rather than the aftermath after something’s gone wrong. Topics Why – Why someone tries to access the environment? Who – Who should be able to access Security basics, part 1 – Why?

Opening words

There are a lot of great blogs and experienced bloggers out there, some more technical, some on higher level, so what harm could one more cause? Author My name is Kari Ruissalo and I’m working mainly with identity and access management both as a consultant and providing continuous services for our customers. My areas of Opening words