SlideShare a Scribd company logo
3 Strategies to
Secure Content with
User Groups
What we’ll cover
Document Level Security
Page Level Security
How to implement security
based on:
	 Job position
	 Work groups
	Geography
Most content is from
the OPIN blog
Manual Security is Broken
The pace of employee changeover
and content creation makes manual
updates unreliable.
Relying on an authoritative source
like Active Directory makes security
much tighter.
Manual Security is Broken
Risk increases as users grant
access at their own discretion.
User-dictated updates may not align
with corporate security protocol.
2 Types of Security
Document Level Page Level
Document Level Security
Showing or hiding an entire
document for a user based
on their permissions
Document Level Security
When using Document Level
Security the document should not
contain any information the users
are not authorized to view.
Share this deck with
your Information
Security team!
Document Level Security
Example
Those processing payroll must see the
whole report since they need all of the
payroll information to perform their job.
Page Level Security
Restricting access within a
document based on page content.
Why is Page Level Security
Helpful?
1. Keep sensitive data safe
2. Remove unhelpful content
	 (more content isn’t always good)
3 Strategies for
Implementing Security
Secure by Job Position
Secure by Group
Secure by Region
3 STRATEGIES
Securing content by job position
lets you quickly give new hires
or transfers access to
relevant content.
Secure by Job Position
Only showing content relevant
to the employees job promotes
security & the bloat doesn’t get
in the way of finding what they’re
looking for.
Secure by Job Position
Job Position Example
A member of the accounts
payables team has access to
all payables reports.
Like this deck?
Checkout our blog
for more document
security content!
OPIN.com/blog
Take Away
Only showing reports that relate
to a person’s job function keeps
unwanted viewers at bay and makes
it easier to find helpful information.
A category for multiple
job positions with in a
functional group.
Secure by Groups
Group Example
Business analysts are part of the
marketing group and they should see
all of the marketing group’s content
in additional to what is shown to
anyone who is a Business Analyst.
Take Away
Groups help you go beyond job
position to provide a wider set of
content to a larger number of people.
Distributed offices and global
teams means some content
is only relevant to specific
geographies
Secure by Geography
Having access to information
from many geographies can
make it too easy to look at
the wrong report, and provide
incorrect information.
Secure by Geography
Limiting what content is
accessible reduces these errors
and makes locating the correct
information easy.
Secure by Geography
Geographic Region Example
The sales mangers for the Northeast and
Midwest regions of the US only have access to
their respective region’s reports.
The North American Sales Manager should see
all reports for regions in North America though.
Take Away
Properly securing content by
geography reduces misinformation and
makes it easier to find the relevant data.
HOW DO
I START?
HOW DO
I START?
Find the document with
the biggest audience.
1:
2:
Secure it at the document
level; only making it accessible
to relevant employees.
3:
Find the document with
the smallest audience.
4:
Secure it at the document
level to keep it hidden from
the masses.
5:
Add more in-depth security by
limiting which pages employees
can see based on their
geography or other permissions.
DOWNLOAD
This is slide deck is
part of a larger ebook
on document security.

More Related Content

Viewers also liked

OER and Teacher Librarians_2014 WLMA
OER and Teacher Librarians_2014 WLMAOER and Teacher Librarians_2014 WLMA
OER and Teacher Librarians_2014 WLMA
OSPI OER Project
 
Advisory Boards that Matter
Advisory Boards that MatterAdvisory Boards that Matter
Advisory Boards that Matter
NAFCareerAcads
 
Pardot Elevate 2012 - The Science Behind Successful & Sustainable Online Even...
Pardot Elevate 2012 - The Science Behind Successful & Sustainable Online Even...Pardot Elevate 2012 - The Science Behind Successful & Sustainable Online Even...
Pardot Elevate 2012 - The Science Behind Successful & Sustainable Online Even...
Pardot
 
OER User Groups for K-12 Educators
OER User Groups for K-12 EducatorsOER User Groups for K-12 Educators
OER User Groups for K-12 Educators
OSPI OER Project
 
Study "Customer Advisory Boards"
Study "Customer Advisory Boards"Study "Customer Advisory Boards"
Study "Customer Advisory Boards"
Sasserath Munzinger Plus
 
Embracing Life: Northern Saskatchewan Working Together
Embracing Life: Northern Saskatchewan Working TogetherEmbracing Life: Northern Saskatchewan Working Together
Embracing Life: Northern Saskatchewan Working Together
Saskatchewan Health Care Quality Summit
 
Focus groups-101.key
Focus groups-101.keyFocus groups-101.key
Focus groups-101.key
tcarp123
 
User Groups 2.1 - Linux User Groups
User Groups 2.1 - Linux User GroupsUser Groups 2.1 - Linux User Groups
User Groups 2.1 - Linux User Groups
Larry Cafiero
 
Customer Advisory Board - Core Competencies of a World Class CAB
Customer Advisory Board - Core Competencies of a World Class CABCustomer Advisory Board - Core Competencies of a World Class CAB
Customer Advisory Board - Core Competencies of a World Class CAB
Customer Advisory
 
Focus Groups are a Joke
Focus Groups are a JokeFocus Groups are a Joke
Focus Groups are a Joke
Dan Berlin
 
The CustomerLoop Customer Advisory Board model
The CustomerLoop Customer Advisory Board modelThe CustomerLoop Customer Advisory Board model
The CustomerLoop Customer Advisory Board model
Christine Nolan
 
Creating a Patient and Family Advisory Council: From Idea to Implementatio…
Creating a Patient and Family Advisory Council:  From Idea to Implementatio…Creating a Patient and Family Advisory Council:  From Idea to Implementatio…
Creating a Patient and Family Advisory Council: From Idea to Implementatio…
Saskatchewan Health Care Quality Summit
 
"Advisory Boards, User Groups, and Key Opinion Leaders to Achieve Business G...
"Advisory Boards, User Groups, and Key Opinion Leaders to  Achieve Business G..."Advisory Boards, User Groups, and Key Opinion Leaders to  Achieve Business G...
"Advisory Boards, User Groups, and Key Opinion Leaders to Achieve Business G...
C. A. White
 
ARIN 34 ARIN Advisory Council Report
ARIN 34 ARIN Advisory Council ReportARIN 34 ARIN Advisory Council Report
ARIN 34 ARIN Advisory Council Report
ARIN
 
User groups - share your knowledge
User groups - share your knowledgeUser groups - share your knowledge
User groups - share your knowledge
Zbyszek Mockun
 
Customer Council
Customer CouncilCustomer Council
Customer Council
Rackspace Hosting
 
NCompassLive: Surveys, Focus Groups & Observation
NCompassLive: Surveys, Focus Groups & ObservationNCompassLive: Surveys, Focus Groups & Observation
NCompassLive: Surveys, Focus Groups & Observation
Nebraska Library Commission
 
user research part 1 - surveys, focus groups, interviews
user research part 1 - surveys, focus groups, interviewsuser research part 1 - surveys, focus groups, interviews
user research part 1 - surveys, focus groups, interviews
Dr. V Vorvoreanu
 
Virtual Advisory Board Best Practices
Virtual Advisory Board Best PracticesVirtual Advisory Board Best Practices
Virtual Advisory Board Best Practices
Within3
 
Customer Summits as a First Step for CABs
Customer Summits as a First Step for CABsCustomer Summits as a First Step for CABs
Customer Summits as a First Step for CABs
Clearworks
 

Viewers also liked (20)

OER and Teacher Librarians_2014 WLMA
OER and Teacher Librarians_2014 WLMAOER and Teacher Librarians_2014 WLMA
OER and Teacher Librarians_2014 WLMA
 
Advisory Boards that Matter
Advisory Boards that MatterAdvisory Boards that Matter
Advisory Boards that Matter
 
Pardot Elevate 2012 - The Science Behind Successful & Sustainable Online Even...
Pardot Elevate 2012 - The Science Behind Successful & Sustainable Online Even...Pardot Elevate 2012 - The Science Behind Successful & Sustainable Online Even...
Pardot Elevate 2012 - The Science Behind Successful & Sustainable Online Even...
 
OER User Groups for K-12 Educators
OER User Groups for K-12 EducatorsOER User Groups for K-12 Educators
OER User Groups for K-12 Educators
 
Study "Customer Advisory Boards"
Study "Customer Advisory Boards"Study "Customer Advisory Boards"
Study "Customer Advisory Boards"
 
Embracing Life: Northern Saskatchewan Working Together
Embracing Life: Northern Saskatchewan Working TogetherEmbracing Life: Northern Saskatchewan Working Together
Embracing Life: Northern Saskatchewan Working Together
 
Focus groups-101.key
Focus groups-101.keyFocus groups-101.key
Focus groups-101.key
 
User Groups 2.1 - Linux User Groups
User Groups 2.1 - Linux User GroupsUser Groups 2.1 - Linux User Groups
User Groups 2.1 - Linux User Groups
 
Customer Advisory Board - Core Competencies of a World Class CAB
Customer Advisory Board - Core Competencies of a World Class CABCustomer Advisory Board - Core Competencies of a World Class CAB
Customer Advisory Board - Core Competencies of a World Class CAB
 
Focus Groups are a Joke
Focus Groups are a JokeFocus Groups are a Joke
Focus Groups are a Joke
 
The CustomerLoop Customer Advisory Board model
The CustomerLoop Customer Advisory Board modelThe CustomerLoop Customer Advisory Board model
The CustomerLoop Customer Advisory Board model
 
Creating a Patient and Family Advisory Council: From Idea to Implementatio…
Creating a Patient and Family Advisory Council:  From Idea to Implementatio…Creating a Patient and Family Advisory Council:  From Idea to Implementatio…
Creating a Patient and Family Advisory Council: From Idea to Implementatio…
 
"Advisory Boards, User Groups, and Key Opinion Leaders to Achieve Business G...
"Advisory Boards, User Groups, and Key Opinion Leaders to  Achieve Business G..."Advisory Boards, User Groups, and Key Opinion Leaders to  Achieve Business G...
"Advisory Boards, User Groups, and Key Opinion Leaders to Achieve Business G...
 
ARIN 34 ARIN Advisory Council Report
ARIN 34 ARIN Advisory Council ReportARIN 34 ARIN Advisory Council Report
ARIN 34 ARIN Advisory Council Report
 
User groups - share your knowledge
User groups - share your knowledgeUser groups - share your knowledge
User groups - share your knowledge
 
Customer Council
Customer CouncilCustomer Council
Customer Council
 
NCompassLive: Surveys, Focus Groups & Observation
NCompassLive: Surveys, Focus Groups & ObservationNCompassLive: Surveys, Focus Groups & Observation
NCompassLive: Surveys, Focus Groups & Observation
 
user research part 1 - surveys, focus groups, interviews
user research part 1 - surveys, focus groups, interviewsuser research part 1 - surveys, focus groups, interviews
user research part 1 - surveys, focus groups, interviews
 
Virtual Advisory Board Best Practices
Virtual Advisory Board Best PracticesVirtual Advisory Board Best Practices
Virtual Advisory Board Best Practices
 
Customer Summits as a First Step for CABs
Customer Summits as a First Step for CABsCustomer Summits as a First Step for CABs
Customer Summits as a First Step for CABs
 

Similar to How to Automatically Secure Content with User Groups

Lorrach Mkt Res T3 Mis
Lorrach Mkt Res T3 MisLorrach Mkt Res T3 Mis
Lorrach Mkt Res T3 Mis
Tonyversity
 
Five steps to achieve success with application security
Five steps to achieve success with application securityFive steps to achieve success with application security
Five steps to achieve success with application security
IBM Security
 
Protecting your Teams Work across Microsoft 365
Protecting your Teams Work across Microsoft 365Protecting your Teams Work across Microsoft 365
Protecting your Teams Work across Microsoft 365
Joanne Klein
 
Post 1Participative Budgetary Process serves several benefit.docx
Post 1Participative Budgetary Process serves several benefit.docxPost 1Participative Budgetary Process serves several benefit.docx
Post 1Participative Budgetary Process serves several benefit.docx
stilliegeorgiana
 
Microsoft Teams in the Modern Workplace
Microsoft Teams in the Modern WorkplaceMicrosoft Teams in the Modern Workplace
Microsoft Teams in the Modern Workplace
Joanne Klein
 
An Intro to Core
An Intro to CoreAn Intro to Core
An Intro to Core
Resolver Inc.
 
Harry Davis just finished interviewing a candidate to fill another.docx
Harry Davis just finished interviewing a candidate to fill another.docxHarry Davis just finished interviewing a candidate to fill another.docx
Harry Davis just finished interviewing a candidate to fill another.docx
shericehewat
 
Ferraz Itp368 Optmizing Information Security
Ferraz Itp368 Optmizing Information SecurityFerraz Itp368 Optmizing Information Security
Ferraz Itp368 Optmizing Information Security
mferraz
 
How to Build a Privacy Program
How to Build a Privacy ProgramHow to Build a Privacy Program
How to Build a Privacy Program
secratic
 
VER_WP_CrackingCode_FINAL
VER_WP_CrackingCode_FINALVER_WP_CrackingCode_FINAL
VER_WP_CrackingCode_FINAL
Jessica Lavery Pozerski
 
For our discussion question, we focus on recent trends in security t.pdf
For our discussion question, we focus on recent trends in security t.pdfFor our discussion question, we focus on recent trends in security t.pdf
For our discussion question, we focus on recent trends in security t.pdf
alokkesh
 
Fundamentals of contact center reporting
Fundamentals of contact center reportingFundamentals of contact center reporting
Fundamentals of contact center reporting
Spectrum
 
Wp security-data-safe
Wp security-data-safeWp security-data-safe
Wp security-data-safe
ALI ANWAR, OCP®
 
Proteccion de datos contra pérdida de los mismos con MS365
Proteccion de datos contra pérdida de los mismos  con MS365Proteccion de datos contra pérdida de los mismos  con MS365
Proteccion de datos contra pérdida de los mismos con MS365
RalSejas
 
Compare-and-Recommendation
Compare-and-RecommendationCompare-and-Recommendation
Compare-and-Recommendation
Kent Keeler
 
AMCTO presentation on moving from records managment to information management
AMCTO presentation on moving from records managment to information managementAMCTO presentation on moving from records managment to information management
AMCTO presentation on moving from records managment to information management
Christopher Wynder
 
Segmentation in 3 Easy Steps
Segmentation in 3 Easy Steps Segmentation in 3 Easy Steps
Segmentation in 3 Easy Steps
Act-On Software
 
Making data useful - Designing great dashboards
Making data useful - Designing great dashboardsMaking data useful - Designing great dashboards
Making data useful - Designing great dashboards
robertwolverton
 
Intranet focus search strategy a z - from Findability Day 2014
Intranet focus search strategy a z - from Findability Day 2014Intranet focus search strategy a z - from Findability Day 2014
Intranet focus search strategy a z - from Findability Day 2014
Findwise
 
The Ultimate Buyer's Guide to Employee Advocacy Solutions
The Ultimate Buyer's Guide to Employee Advocacy SolutionsThe Ultimate Buyer's Guide to Employee Advocacy Solutions
The Ultimate Buyer's Guide to Employee Advocacy Solutions
George Kobakov
 

Similar to How to Automatically Secure Content with User Groups (20)

Lorrach Mkt Res T3 Mis
Lorrach Mkt Res T3 MisLorrach Mkt Res T3 Mis
Lorrach Mkt Res T3 Mis
 
Five steps to achieve success with application security
Five steps to achieve success with application securityFive steps to achieve success with application security
Five steps to achieve success with application security
 
Protecting your Teams Work across Microsoft 365
Protecting your Teams Work across Microsoft 365Protecting your Teams Work across Microsoft 365
Protecting your Teams Work across Microsoft 365
 
Post 1Participative Budgetary Process serves several benefit.docx
Post 1Participative Budgetary Process serves several benefit.docxPost 1Participative Budgetary Process serves several benefit.docx
Post 1Participative Budgetary Process serves several benefit.docx
 
Microsoft Teams in the Modern Workplace
Microsoft Teams in the Modern WorkplaceMicrosoft Teams in the Modern Workplace
Microsoft Teams in the Modern Workplace
 
An Intro to Core
An Intro to CoreAn Intro to Core
An Intro to Core
 
Harry Davis just finished interviewing a candidate to fill another.docx
Harry Davis just finished interviewing a candidate to fill another.docxHarry Davis just finished interviewing a candidate to fill another.docx
Harry Davis just finished interviewing a candidate to fill another.docx
 
Ferraz Itp368 Optmizing Information Security
Ferraz Itp368 Optmizing Information SecurityFerraz Itp368 Optmizing Information Security
Ferraz Itp368 Optmizing Information Security
 
How to Build a Privacy Program
How to Build a Privacy ProgramHow to Build a Privacy Program
How to Build a Privacy Program
 
VER_WP_CrackingCode_FINAL
VER_WP_CrackingCode_FINALVER_WP_CrackingCode_FINAL
VER_WP_CrackingCode_FINAL
 
For our discussion question, we focus on recent trends in security t.pdf
For our discussion question, we focus on recent trends in security t.pdfFor our discussion question, we focus on recent trends in security t.pdf
For our discussion question, we focus on recent trends in security t.pdf
 
Fundamentals of contact center reporting
Fundamentals of contact center reportingFundamentals of contact center reporting
Fundamentals of contact center reporting
 
Wp security-data-safe
Wp security-data-safeWp security-data-safe
Wp security-data-safe
 
Proteccion de datos contra pérdida de los mismos con MS365
Proteccion de datos contra pérdida de los mismos  con MS365Proteccion de datos contra pérdida de los mismos  con MS365
Proteccion de datos contra pérdida de los mismos con MS365
 
Compare-and-Recommendation
Compare-and-RecommendationCompare-and-Recommendation
Compare-and-Recommendation
 
AMCTO presentation on moving from records managment to information management
AMCTO presentation on moving from records managment to information managementAMCTO presentation on moving from records managment to information management
AMCTO presentation on moving from records managment to information management
 
Segmentation in 3 Easy Steps
Segmentation in 3 Easy Steps Segmentation in 3 Easy Steps
Segmentation in 3 Easy Steps
 
Making data useful - Designing great dashboards
Making data useful - Designing great dashboardsMaking data useful - Designing great dashboards
Making data useful - Designing great dashboards
 
Intranet focus search strategy a z - from Findability Day 2014
Intranet focus search strategy a z - from Findability Day 2014Intranet focus search strategy a z - from Findability Day 2014
Intranet focus search strategy a z - from Findability Day 2014
 
The Ultimate Buyer's Guide to Employee Advocacy Solutions
The Ultimate Buyer's Guide to Employee Advocacy SolutionsThe Ultimate Buyer's Guide to Employee Advocacy Solutions
The Ultimate Buyer's Guide to Employee Advocacy Solutions
 

Recently uploaded

Public CyberSecurity Awareness Presentation 2024.pptx
Public CyberSecurity Awareness Presentation 2024.pptxPublic CyberSecurity Awareness Presentation 2024.pptx
Public CyberSecurity Awareness Presentation 2024.pptx
marufrahmanstratejm
 
JavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green MasterplanJavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green Masterplan
Miro Wengner
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 
AWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptxAWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptx
HarisZaheer8
 
FREE A4 Cyber Security Awareness Posters-Social Engineering part 3
FREE A4 Cyber Security Awareness  Posters-Social Engineering part 3FREE A4 Cyber Security Awareness  Posters-Social Engineering part 3
FREE A4 Cyber Security Awareness Posters-Social Engineering part 3
Data Hops
 
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
Edge AI and Vision Alliance
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
Jason Packer
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
akankshawande
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
Tomaz Bratanic
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
 
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyFreshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
ScyllaDB
 
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
alexjohnson7307
 
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - HiikeSystem Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
Hiike
 
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their MainframeDigital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Precisely
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
Brandon Minnick, MBA
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
Zilliz
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Alpen-Adria-Universität
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
saastr
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Tosin Akinosho
 

Recently uploaded (20)

Public CyberSecurity Awareness Presentation 2024.pptx
Public CyberSecurity Awareness Presentation 2024.pptxPublic CyberSecurity Awareness Presentation 2024.pptx
Public CyberSecurity Awareness Presentation 2024.pptx
 
JavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green MasterplanJavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green Masterplan
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 
AWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptxAWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptx
 
FREE A4 Cyber Security Awareness Posters-Social Engineering part 3
FREE A4 Cyber Security Awareness  Posters-Social Engineering part 3FREE A4 Cyber Security Awareness  Posters-Social Engineering part 3
FREE A4 Cyber Security Awareness Posters-Social Engineering part 3
 
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
 
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyFreshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
 
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
 
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - HiikeSystem Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
 
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their MainframeDigital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
 

How to Automatically Secure Content with User Groups

  • 1. 3 Strategies to Secure Content with User Groups
  • 2. What we’ll cover Document Level Security Page Level Security How to implement security based on: Job position Work groups Geography
  • 3. Most content is from the OPIN blog
  • 4. Manual Security is Broken The pace of employee changeover and content creation makes manual updates unreliable. Relying on an authoritative source like Active Directory makes security much tighter.
  • 5. Manual Security is Broken Risk increases as users grant access at their own discretion. User-dictated updates may not align with corporate security protocol.
  • 6. 2 Types of Security Document Level Page Level
  • 7. Document Level Security Showing or hiding an entire document for a user based on their permissions
  • 8. Document Level Security When using Document Level Security the document should not contain any information the users are not authorized to view.
  • 9. Share this deck with your Information Security team!
  • 10. Document Level Security Example Those processing payroll must see the whole report since they need all of the payroll information to perform their job.
  • 11. Page Level Security Restricting access within a document based on page content.
  • 12. Why is Page Level Security Helpful? 1. Keep sensitive data safe 2. Remove unhelpful content (more content isn’t always good)
  • 13. 3 Strategies for Implementing Security Secure by Job Position Secure by Group Secure by Region 3 STRATEGIES
  • 14. Securing content by job position lets you quickly give new hires or transfers access to relevant content. Secure by Job Position
  • 15. Only showing content relevant to the employees job promotes security & the bloat doesn’t get in the way of finding what they’re looking for. Secure by Job Position
  • 16. Job Position Example A member of the accounts payables team has access to all payables reports.
  • 17. Like this deck? Checkout our blog for more document security content! OPIN.com/blog
  • 18. Take Away Only showing reports that relate to a person’s job function keeps unwanted viewers at bay and makes it easier to find helpful information.
  • 19. A category for multiple job positions with in a functional group. Secure by Groups
  • 20. Group Example Business analysts are part of the marketing group and they should see all of the marketing group’s content in additional to what is shown to anyone who is a Business Analyst.
  • 21. Take Away Groups help you go beyond job position to provide a wider set of content to a larger number of people.
  • 22. Distributed offices and global teams means some content is only relevant to specific geographies Secure by Geography
  • 23. Having access to information from many geographies can make it too easy to look at the wrong report, and provide incorrect information. Secure by Geography
  • 24. Limiting what content is accessible reduces these errors and makes locating the correct information easy. Secure by Geography
  • 25. Geographic Region Example The sales mangers for the Northeast and Midwest regions of the US only have access to their respective region’s reports. The North American Sales Manager should see all reports for regions in North America though.
  • 26. Take Away Properly securing content by geography reduces misinformation and makes it easier to find the relevant data.
  • 27. HOW DO I START? HOW DO I START?
  • 28. Find the document with the biggest audience. 1:
  • 29. 2: Secure it at the document level; only making it accessible to relevant employees.
  • 30. 3: Find the document with the smallest audience.
  • 31. 4: Secure it at the document level to keep it hidden from the masses.
  • 32. 5: Add more in-depth security by limiting which pages employees can see based on their geography or other permissions.
  • 33. DOWNLOAD This is slide deck is part of a larger ebook on document security.