SlideShare ist ein Scribd-Unternehmen logo
1 von 33
Downloaden Sie, um offline zu lesen
3 Strategies to
Secure Content with
User Groups
What we’ll cover
Document Level Security
Page Level Security
How to implement security
based on:
	 Job position
	 Work groups
	Geography
Most content is from
the OPIN blog
Manual Security is Broken
The pace of employee changeover
and content creation makes manual
updates unreliable.
Relying on an authoritative source
like Active Directory makes security
much tighter.
Manual Security is Broken
Risk increases as users grant
access at their own discretion.
User-dictated updates may not align
with corporate security protocol.
2 Types of Security
Document Level Page Level
Document Level Security
Showing or hiding an entire
document for a user based
on their permissions
Document Level Security
When using Document Level
Security the document should not
contain any information the users
are not authorized to view.
Share this deck with
your Information
Security team!
Document Level Security
Example
Those processing payroll must see the
whole report since they need all of the
payroll information to perform their job.
Page Level Security
Restricting access within a
document based on page content.
Why is Page Level Security
Helpful?
1. Keep sensitive data safe
2. Remove unhelpful content
	 (more content isn’t always good)
3 Strategies for
Implementing Security
Secure by Job Position
Secure by Group
Secure by Region
3 STRATEGIES
Securing content by job position
lets you quickly give new hires
or transfers access to
relevant content.
Secure by Job Position
Only showing content relevant
to the employees job promotes
security & the bloat doesn’t get
in the way of finding what they’re
looking for.
Secure by Job Position
Job Position Example
A member of the accounts
payables team has access to
all payables reports.
Like this deck?
Checkout our blog
for more document
security content!
OPIN.com/blog
Take Away
Only showing reports that relate
to a person’s job function keeps
unwanted viewers at bay and makes
it easier to find helpful information.
A category for multiple
job positions with in a
functional group.
Secure by Groups
Group Example
Business analysts are part of the
marketing group and they should see
all of the marketing group’s content
in additional to what is shown to
anyone who is a Business Analyst.
Take Away
Groups help you go beyond job
position to provide a wider set of
content to a larger number of people.
Distributed offices and global
teams means some content
is only relevant to specific
geographies
Secure by Geography
Having access to information
from many geographies can
make it too easy to look at
the wrong report, and provide
incorrect information.
Secure by Geography
Limiting what content is
accessible reduces these errors
and makes locating the correct
information easy.
Secure by Geography
Geographic Region Example
The sales mangers for the Northeast and
Midwest regions of the US only have access to
their respective region’s reports.
The North American Sales Manager should see
all reports for regions in North America though.
Take Away
Properly securing content by
geography reduces misinformation and
makes it easier to find the relevant data.
HOW DO
I START?
HOW DO
I START?
Find the document with
the biggest audience.
1:
2:
Secure it at the document
level; only making it accessible
to relevant employees.
3:
Find the document with
the smallest audience.
4:
Secure it at the document
level to keep it hidden from
the masses.
5:
Add more in-depth security by
limiting which pages employees
can see based on their
geography or other permissions.
DOWNLOAD
This is slide deck is
part of a larger ebook
on document security.

Weitere ähnliche Inhalte

Andere mochten auch

OER and Teacher Librarians_2014 WLMA
OER and Teacher Librarians_2014 WLMAOER and Teacher Librarians_2014 WLMA
OER and Teacher Librarians_2014 WLMAOSPI OER Project
 
Advisory Boards that Matter
Advisory Boards that MatterAdvisory Boards that Matter
Advisory Boards that MatterNAFCareerAcads
 
Pardot Elevate 2012 - The Science Behind Successful & Sustainable Online Even...
Pardot Elevate 2012 - The Science Behind Successful & Sustainable Online Even...Pardot Elevate 2012 - The Science Behind Successful & Sustainable Online Even...
Pardot Elevate 2012 - The Science Behind Successful & Sustainable Online Even...Pardot
 
OER User Groups for K-12 Educators
OER User Groups for K-12 EducatorsOER User Groups for K-12 Educators
OER User Groups for K-12 EducatorsOSPI OER Project
 
Focus groups-101.key
Focus groups-101.keyFocus groups-101.key
Focus groups-101.keytcarp123
 
User Groups 2.1 - Linux User Groups
User Groups 2.1 - Linux User GroupsUser Groups 2.1 - Linux User Groups
User Groups 2.1 - Linux User GroupsLarry Cafiero
 
Customer Advisory Board - Core Competencies of a World Class CAB
Customer Advisory Board - Core Competencies of a World Class CABCustomer Advisory Board - Core Competencies of a World Class CAB
Customer Advisory Board - Core Competencies of a World Class CABCustomer Advisory
 
Focus Groups are a Joke
Focus Groups are a JokeFocus Groups are a Joke
Focus Groups are a JokeDan Berlin
 
The CustomerLoop Customer Advisory Board model
The CustomerLoop Customer Advisory Board modelThe CustomerLoop Customer Advisory Board model
The CustomerLoop Customer Advisory Board modelChristine Nolan
 
Creating a Patient and Family Advisory Council: From Idea to Implementatio…
Creating a Patient and Family Advisory Council:  From Idea to Implementatio…Creating a Patient and Family Advisory Council:  From Idea to Implementatio…
Creating a Patient and Family Advisory Council: From Idea to Implementatio…Saskatchewan Health Care Quality Summit
 
"Advisory Boards, User Groups, and Key Opinion Leaders to Achieve Business G...
"Advisory Boards, User Groups, and Key Opinion Leaders to  Achieve Business G..."Advisory Boards, User Groups, and Key Opinion Leaders to  Achieve Business G...
"Advisory Boards, User Groups, and Key Opinion Leaders to Achieve Business G...C. A. White
 
ARIN 34 ARIN Advisory Council Report
ARIN 34 ARIN Advisory Council ReportARIN 34 ARIN Advisory Council Report
ARIN 34 ARIN Advisory Council ReportARIN
 
User groups - share your knowledge
User groups - share your knowledgeUser groups - share your knowledge
User groups - share your knowledgeZbyszek Mockun
 
NCompassLive: Surveys, Focus Groups & Observation
NCompassLive: Surveys, Focus Groups & ObservationNCompassLive: Surveys, Focus Groups & Observation
NCompassLive: Surveys, Focus Groups & ObservationNebraska Library Commission
 
user research part 1 - surveys, focus groups, interviews
user research part 1 - surveys, focus groups, interviewsuser research part 1 - surveys, focus groups, interviews
user research part 1 - surveys, focus groups, interviewsDr. V Vorvoreanu
 
Virtual Advisory Board Best Practices
Virtual Advisory Board Best PracticesVirtual Advisory Board Best Practices
Virtual Advisory Board Best PracticesWithin3
 
Customer Summits as a First Step for CABs
Customer Summits as a First Step for CABsCustomer Summits as a First Step for CABs
Customer Summits as a First Step for CABsClearworks
 

Andere mochten auch (20)

OER and Teacher Librarians_2014 WLMA
OER and Teacher Librarians_2014 WLMAOER and Teacher Librarians_2014 WLMA
OER and Teacher Librarians_2014 WLMA
 
Advisory Boards that Matter
Advisory Boards that MatterAdvisory Boards that Matter
Advisory Boards that Matter
 
Pardot Elevate 2012 - The Science Behind Successful & Sustainable Online Even...
Pardot Elevate 2012 - The Science Behind Successful & Sustainable Online Even...Pardot Elevate 2012 - The Science Behind Successful & Sustainable Online Even...
Pardot Elevate 2012 - The Science Behind Successful & Sustainable Online Even...
 
OER User Groups for K-12 Educators
OER User Groups for K-12 EducatorsOER User Groups for K-12 Educators
OER User Groups for K-12 Educators
 
Study "Customer Advisory Boards"
Study "Customer Advisory Boards"Study "Customer Advisory Boards"
Study "Customer Advisory Boards"
 
Embracing Life: Northern Saskatchewan Working Together
Embracing Life: Northern Saskatchewan Working TogetherEmbracing Life: Northern Saskatchewan Working Together
Embracing Life: Northern Saskatchewan Working Together
 
Focus groups-101.key
Focus groups-101.keyFocus groups-101.key
Focus groups-101.key
 
User Groups 2.1 - Linux User Groups
User Groups 2.1 - Linux User GroupsUser Groups 2.1 - Linux User Groups
User Groups 2.1 - Linux User Groups
 
Customer Advisory Board - Core Competencies of a World Class CAB
Customer Advisory Board - Core Competencies of a World Class CABCustomer Advisory Board - Core Competencies of a World Class CAB
Customer Advisory Board - Core Competencies of a World Class CAB
 
Focus Groups are a Joke
Focus Groups are a JokeFocus Groups are a Joke
Focus Groups are a Joke
 
The CustomerLoop Customer Advisory Board model
The CustomerLoop Customer Advisory Board modelThe CustomerLoop Customer Advisory Board model
The CustomerLoop Customer Advisory Board model
 
Creating a Patient and Family Advisory Council: From Idea to Implementatio…
Creating a Patient and Family Advisory Council:  From Idea to Implementatio…Creating a Patient and Family Advisory Council:  From Idea to Implementatio…
Creating a Patient and Family Advisory Council: From Idea to Implementatio…
 
"Advisory Boards, User Groups, and Key Opinion Leaders to Achieve Business G...
"Advisory Boards, User Groups, and Key Opinion Leaders to  Achieve Business G..."Advisory Boards, User Groups, and Key Opinion Leaders to  Achieve Business G...
"Advisory Boards, User Groups, and Key Opinion Leaders to Achieve Business G...
 
ARIN 34 ARIN Advisory Council Report
ARIN 34 ARIN Advisory Council ReportARIN 34 ARIN Advisory Council Report
ARIN 34 ARIN Advisory Council Report
 
User groups - share your knowledge
User groups - share your knowledgeUser groups - share your knowledge
User groups - share your knowledge
 
Customer Council
Customer CouncilCustomer Council
Customer Council
 
NCompassLive: Surveys, Focus Groups & Observation
NCompassLive: Surveys, Focus Groups & ObservationNCompassLive: Surveys, Focus Groups & Observation
NCompassLive: Surveys, Focus Groups & Observation
 
user research part 1 - surveys, focus groups, interviews
user research part 1 - surveys, focus groups, interviewsuser research part 1 - surveys, focus groups, interviews
user research part 1 - surveys, focus groups, interviews
 
Virtual Advisory Board Best Practices
Virtual Advisory Board Best PracticesVirtual Advisory Board Best Practices
Virtual Advisory Board Best Practices
 
Customer Summits as a First Step for CABs
Customer Summits as a First Step for CABsCustomer Summits as a First Step for CABs
Customer Summits as a First Step for CABs
 

Ähnlich wie How to Automatically Secure Content with User Groups

Lorrach Mkt Res T3 Mis
Lorrach Mkt Res T3 MisLorrach Mkt Res T3 Mis
Lorrach Mkt Res T3 MisTonyversity
 
Five steps to achieve success with application security
Five steps to achieve success with application securityFive steps to achieve success with application security
Five steps to achieve success with application securityIBM Security
 
Protecting your Teams Work across Microsoft 365
Protecting your Teams Work across Microsoft 365Protecting your Teams Work across Microsoft 365
Protecting your Teams Work across Microsoft 365Joanne Klein
 
Post 1Participative Budgetary Process serves several benefit.docx
Post 1Participative Budgetary Process serves several benefit.docxPost 1Participative Budgetary Process serves several benefit.docx
Post 1Participative Budgetary Process serves several benefit.docxstilliegeorgiana
 
Microsoft Teams in the Modern Workplace
Microsoft Teams in the Modern WorkplaceMicrosoft Teams in the Modern Workplace
Microsoft Teams in the Modern WorkplaceJoanne Klein
 
Harry Davis just finished interviewing a candidate to fill another.docx
Harry Davis just finished interviewing a candidate to fill another.docxHarry Davis just finished interviewing a candidate to fill another.docx
Harry Davis just finished interviewing a candidate to fill another.docxshericehewat
 
Ferraz Itp368 Optmizing Information Security
Ferraz Itp368 Optmizing Information SecurityFerraz Itp368 Optmizing Information Security
Ferraz Itp368 Optmizing Information Securitymferraz
 
How to Build a Privacy Program
How to Build a Privacy ProgramHow to Build a Privacy Program
How to Build a Privacy Programsecratic
 
For our discussion question, we focus on recent trends in security t.pdf
For our discussion question, we focus on recent trends in security t.pdfFor our discussion question, we focus on recent trends in security t.pdf
For our discussion question, we focus on recent trends in security t.pdfalokkesh
 
Fundamentals of contact center reporting
Fundamentals of contact center reportingFundamentals of contact center reporting
Fundamentals of contact center reportingSpectrum
 
Proteccion de datos contra pérdida de los mismos con MS365
Proteccion de datos contra pérdida de los mismos  con MS365Proteccion de datos contra pérdida de los mismos  con MS365
Proteccion de datos contra pérdida de los mismos con MS365RalSejas
 
Compare-and-Recommendation
Compare-and-RecommendationCompare-and-Recommendation
Compare-and-RecommendationKent Keeler
 
AMCTO presentation on moving from records managment to information management
AMCTO presentation on moving from records managment to information managementAMCTO presentation on moving from records managment to information management
AMCTO presentation on moving from records managment to information managementChristopher Wynder
 
Segmentation in 3 Easy Steps
Segmentation in 3 Easy Steps Segmentation in 3 Easy Steps
Segmentation in 3 Easy Steps Act-On Software
 
Making data useful - Designing great dashboards
Making data useful - Designing great dashboardsMaking data useful - Designing great dashboards
Making data useful - Designing great dashboardsrobertwolverton
 
Intranet focus search strategy a z - from Findability Day 2014
Intranet focus search strategy a z - from Findability Day 2014Intranet focus search strategy a z - from Findability Day 2014
Intranet focus search strategy a z - from Findability Day 2014Findwise
 
The Ultimate Buyer's Guide to Employee Advocacy Solutions
The Ultimate Buyer's Guide to Employee Advocacy SolutionsThe Ultimate Buyer's Guide to Employee Advocacy Solutions
The Ultimate Buyer's Guide to Employee Advocacy SolutionsGeorge Kobakov
 

Ähnlich wie How to Automatically Secure Content with User Groups (20)

Lorrach Mkt Res T3 Mis
Lorrach Mkt Res T3 MisLorrach Mkt Res T3 Mis
Lorrach Mkt Res T3 Mis
 
Five steps to achieve success with application security
Five steps to achieve success with application securityFive steps to achieve success with application security
Five steps to achieve success with application security
 
Protecting your Teams Work across Microsoft 365
Protecting your Teams Work across Microsoft 365Protecting your Teams Work across Microsoft 365
Protecting your Teams Work across Microsoft 365
 
Post 1Participative Budgetary Process serves several benefit.docx
Post 1Participative Budgetary Process serves several benefit.docxPost 1Participative Budgetary Process serves several benefit.docx
Post 1Participative Budgetary Process serves several benefit.docx
 
Microsoft Teams in the Modern Workplace
Microsoft Teams in the Modern WorkplaceMicrosoft Teams in the Modern Workplace
Microsoft Teams in the Modern Workplace
 
An Intro to Core
An Intro to CoreAn Intro to Core
An Intro to Core
 
Harry Davis just finished interviewing a candidate to fill another.docx
Harry Davis just finished interviewing a candidate to fill another.docxHarry Davis just finished interviewing a candidate to fill another.docx
Harry Davis just finished interviewing a candidate to fill another.docx
 
Ferraz Itp368 Optmizing Information Security
Ferraz Itp368 Optmizing Information SecurityFerraz Itp368 Optmizing Information Security
Ferraz Itp368 Optmizing Information Security
 
How to Build a Privacy Program
How to Build a Privacy ProgramHow to Build a Privacy Program
How to Build a Privacy Program
 
VER_WP_CrackingCode_FINAL
VER_WP_CrackingCode_FINALVER_WP_CrackingCode_FINAL
VER_WP_CrackingCode_FINAL
 
For our discussion question, we focus on recent trends in security t.pdf
For our discussion question, we focus on recent trends in security t.pdfFor our discussion question, we focus on recent trends in security t.pdf
For our discussion question, we focus on recent trends in security t.pdf
 
Fundamentals of contact center reporting
Fundamentals of contact center reportingFundamentals of contact center reporting
Fundamentals of contact center reporting
 
Wp security-data-safe
Wp security-data-safeWp security-data-safe
Wp security-data-safe
 
Proteccion de datos contra pérdida de los mismos con MS365
Proteccion de datos contra pérdida de los mismos  con MS365Proteccion de datos contra pérdida de los mismos  con MS365
Proteccion de datos contra pérdida de los mismos con MS365
 
Compare-and-Recommendation
Compare-and-RecommendationCompare-and-Recommendation
Compare-and-Recommendation
 
AMCTO presentation on moving from records managment to information management
AMCTO presentation on moving from records managment to information managementAMCTO presentation on moving from records managment to information management
AMCTO presentation on moving from records managment to information management
 
Segmentation in 3 Easy Steps
Segmentation in 3 Easy Steps Segmentation in 3 Easy Steps
Segmentation in 3 Easy Steps
 
Making data useful - Designing great dashboards
Making data useful - Designing great dashboardsMaking data useful - Designing great dashboards
Making data useful - Designing great dashboards
 
Intranet focus search strategy a z - from Findability Day 2014
Intranet focus search strategy a z - from Findability Day 2014Intranet focus search strategy a z - from Findability Day 2014
Intranet focus search strategy a z - from Findability Day 2014
 
The Ultimate Buyer's Guide to Employee Advocacy Solutions
The Ultimate Buyer's Guide to Employee Advocacy SolutionsThe Ultimate Buyer's Guide to Employee Advocacy Solutions
The Ultimate Buyer's Guide to Employee Advocacy Solutions
 

Kürzlich hochgeladen

TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 

Kürzlich hochgeladen (20)

TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 

How to Automatically Secure Content with User Groups

  • 1. 3 Strategies to Secure Content with User Groups
  • 2. What we’ll cover Document Level Security Page Level Security How to implement security based on: Job position Work groups Geography
  • 3. Most content is from the OPIN blog
  • 4. Manual Security is Broken The pace of employee changeover and content creation makes manual updates unreliable. Relying on an authoritative source like Active Directory makes security much tighter.
  • 5. Manual Security is Broken Risk increases as users grant access at their own discretion. User-dictated updates may not align with corporate security protocol.
  • 6. 2 Types of Security Document Level Page Level
  • 7. Document Level Security Showing or hiding an entire document for a user based on their permissions
  • 8. Document Level Security When using Document Level Security the document should not contain any information the users are not authorized to view.
  • 9. Share this deck with your Information Security team!
  • 10. Document Level Security Example Those processing payroll must see the whole report since they need all of the payroll information to perform their job.
  • 11. Page Level Security Restricting access within a document based on page content.
  • 12. Why is Page Level Security Helpful? 1. Keep sensitive data safe 2. Remove unhelpful content (more content isn’t always good)
  • 13. 3 Strategies for Implementing Security Secure by Job Position Secure by Group Secure by Region 3 STRATEGIES
  • 14. Securing content by job position lets you quickly give new hires or transfers access to relevant content. Secure by Job Position
  • 15. Only showing content relevant to the employees job promotes security & the bloat doesn’t get in the way of finding what they’re looking for. Secure by Job Position
  • 16. Job Position Example A member of the accounts payables team has access to all payables reports.
  • 17. Like this deck? Checkout our blog for more document security content! OPIN.com/blog
  • 18. Take Away Only showing reports that relate to a person’s job function keeps unwanted viewers at bay and makes it easier to find helpful information.
  • 19. A category for multiple job positions with in a functional group. Secure by Groups
  • 20. Group Example Business analysts are part of the marketing group and they should see all of the marketing group’s content in additional to what is shown to anyone who is a Business Analyst.
  • 21. Take Away Groups help you go beyond job position to provide a wider set of content to a larger number of people.
  • 22. Distributed offices and global teams means some content is only relevant to specific geographies Secure by Geography
  • 23. Having access to information from many geographies can make it too easy to look at the wrong report, and provide incorrect information. Secure by Geography
  • 24. Limiting what content is accessible reduces these errors and makes locating the correct information easy. Secure by Geography
  • 25. Geographic Region Example The sales mangers for the Northeast and Midwest regions of the US only have access to their respective region’s reports. The North American Sales Manager should see all reports for regions in North America though.
  • 26. Take Away Properly securing content by geography reduces misinformation and makes it easier to find the relevant data.
  • 27. HOW DO I START? HOW DO I START?
  • 28. Find the document with the biggest audience. 1:
  • 29. 2: Secure it at the document level; only making it accessible to relevant employees.
  • 30. 3: Find the document with the smallest audience.
  • 31. 4: Secure it at the document level to keep it hidden from the masses.
  • 32. 5: Add more in-depth security by limiting which pages employees can see based on their geography or other permissions.
  • 33. DOWNLOAD This is slide deck is part of a larger ebook on document security.