Best practices for using Data Access Governance (DAG) in RSA Identity Governance & Lifecycle
Originally Published: 2019-05-21
Article Number
Applies To
Related Products: Data Access Governance (DAG), Windows File Share, SharePoint
Issue
This solution gives an organization the ability to provide context to the types of data and accountable business ownership for various data resources. Additionally, enterprises can leverage the product to verify and validate that user access to files, shares and SharePoint is appropriate given users' roles and responsibilities within the organization.
Resolution
There is no formal document on best practices for Data Access Governance in RSA Identity Governance & Lifecycle. However, Professional Services offers a workshop on best practices for Data Access Governance. Please refer to the documentation on the Data Access Governance Recommended Practice Workshop for more details.
Notes
A complete set of RSA Identity Governance & Lifecycle best practices documentation can be found within the RSA Community.
Related Articles
RSA response to Fox-IT report and Best Practices for RSA SecurID 27Number of Views RSA SecurID Authentication Engine Security Best Practices Guide (Japanese) 74Number of Views RSA SecurID Software Token Security Best Practices Guide for RSA Authentication Manager 8.x 195Number of Views Best practices for RSA Authentication Manager 8.x 386Number of Views Best Practices to Mitigate Password-Spraying Attacks 345Number of Views
Trending Articles
RSA Authentication Manager 8.9 Release Notes (January 2026) RSA announces the availability of the RSA SecurID Hardware Appliance 230 based on the Dell PowerEdge R240 Server How to troubleshoot Oracle database ORA-04030 errors in RSA Identity Governance & Lifecycle RSA Authentication Manager Upgrade Process Microsoft SQL Server Collectors can no longer connect to the SQL Server database after upgrade to Microsoft SQL Server 201…
Don't see what you're looking for?