Cracking the code for a successful conversion: establishing security

1

What kind of security do we need for this conversion?  In fact, where are the security people? 

Including security personnel upfront in any conversion project can sure save some time and heartache later.  It is important to include security for the following:

  1. Source system access – You must be able to profile the source the data, check for quality issues, and attach any ETL or conversion programs to the source system.
  2. New platform (target) security for the data – Databases need the right security groups to be set up.  Also, consider the directory security on the server itself.
  3. User interface security – Who are the people that will require access to this application? In the project plan there is probably a task that refers to end user setup and security.  Consider adding to that deliverable a list of business users who will use this application.  Revisit this list as implementation gets closer and closer.

One other point to consider is training.  It needs to be understood where and how people get trained on the new application.  Are you going to set up FAKE training user identifiers?  What server will be used?  Production? Test? A training server?  All of these would require the software installed, data interfaced, and users set up.

One point I would make here, is to consider the whole solution, not just part of it for security and training.  Address security in the training document, the infrastructure documents, and any user interface documents.

Share

About Author

Joyce Norris-Montanari

President of DBTech Solutions, Inc

Joyce Norris-Montanari, CBIP-CDMP, is president of DBTech Solutions, Inc. Joyce advises clients on all aspects of architectural integration, business intelligence and data management. Joyce advises clients about technology, including tools like ETL, profiling, database, quality and metadata. Joyce speaks frequently at data warehouse conferences and is a contributor to several trade publications. She co-authored Data Warehousing and E-Business (Wiley & Sons) with William H. Inmon and others. Joyce has managed and implemented data integrations, data warehouses and operational data stores in industries like education, pharmaceutical, restaurants, telecommunications, government, health care, financial, oil and gas, insurance, research and development and retail. She can be reached at jmontanari@earthlink.net.

1 Comment

Leave A Reply

Back to Top