Skip to page navigation menu Skip entire header
Brown University
Skip 13 subheader links

Evaluation Criteria for Implementing Disclosure Agreements and Trust Boundaries

Description

Abstract:
Large organizations with multiple product teams that are geographically spread over many time zones need to ensure that product secrecy and confidentiality is maintained while allowing for seamless collaboration between individuals and teams. For corporations with multiple product lines that are resource managed by different groups, data classification and access identification is required for various reasons including compliance to federal and other standards. Commercial tools and solutions in the Identity and Access Management space are the first choice for IT infrastructure professionals. However, these solutions are not cheap and take considerable time to deploy successfully. Further, such solutions are never “one-size-fits-all”, and need specific customizations to provide the maximum benefit. Depending on the organization, these customizations are also buried within confidentiality agreements under a need-to-know-basis. The objective of our critical challenge project is to provide criteria for one such evaluation. In this CCP report, we will cover an outline of the problem, explore the current state of craft, and provide one approach to addressing the issues.
Notes:
Capstone (EMCS)--Brown University, 2018

Access Conditions

Rights
In Copyright
Restrictions on Use
All rights reserved. Collection is open for research.

Citation

Ganti, Vasu, "Evaluation Criteria for Implementing Disclosure Agreements and Trust Boundaries" (2018). Master of Science in Cybersecurity. Brown Digital Repository. Brown University Library. https://doi.org/10.26300/05dm-8p31

Relations

Collection:

  • Master of Science in Cybersecurity

    Brown's Master of Science (ScM) in Cybersecurity is a program for professionals designed to cultivate high-demand, industry executives with the unique and critical ability to devise and execute integrated, comprehensive cybersecurity strategies. Students gain immediately applicable knowledge and, through an …
    ...