After you decide on a Teradata Vantage security strategy, you should document a formal security policy, including:
- An overview of site security needs
- A description of the security procedures that meet the needs
- Specifics of the Vantage security implementation, including:
- A brief overview of the security functions
- A list of required security procedures and actions, who is responsible for them, and who they are likely to affect
- Explanation of the authentication and authorization strategy, including logon options, such as single sign-on
- Database monitoring and auditing principles
- Database security restrictions and management policy for security violations
- A list of contacts who can answer security questions
Depending on the complexity of your security implementation, you may also want to create a user-level instruction sheet or handbook that describes user security requirements, procedures, and restrictions.