Large organizations with multiple product teams that are geographically spread over many time zones need to ensure that product secrecy and confidentiality is maintained while allowing for seamless collaboration between individuals and teams. For corporations with multiple product lines that are resource managed by different groups, data classification and access identification is required for various reasons including compliance to federal and other standards. Commercial tools and solutions in the Identity and Access Management space are the first choice for IT infrastructure professionals. However, these solutions are not cheap and take considerable time to deploy successfully. Further, such solutions are never “one-size-fits-all”, and need specific customizations to provide the maximum benefit. Depending on the organization, these customizations are also buried within confidentiality agreements under a need-to-know-basis. The objective of our critical challenge project is to provide criteria for one such evaluation. In this CCP report, we will cover an outline of the problem, explore the current state of craft, and provide one approach to addressing the issues.
All rights reserved. Collection is open for research.
Citation
Ganti, Vasu,
"Evaluation Criteria for Implementing Disclosure Agreements and Trust Boundaries"
(2018).
Master of Science in Cybersecurity.
Brown Digital Repository. Brown University Library.
https://doi.org/10.26300/05dm-8p31
Brown's Master of Science (ScM) in Cybersecurity is a program for professionals designed to cultivate high-demand, industry executives with the unique and critical ability to devise and execute integrated, comprehensive cybersecurity strategies. Students gain immediately applicable knowledge and, through an …