Developing a Teradata Vantage Security Policy - Advanced SQL Engine - Teradata Database

Security Administration

Product
Advanced SQL Engine
Teradata Database
Release Number
17.05
17.00
Published
September 2020
Language
English (United States)
Last Update
2021-01-23
dita:mapPath
ied1556235912841.ditamap
dita:ditavalPath
lze1555437562152.ditaval
dita:id
B035-1100
lifecycle
previous
Product Category
Teradata Vantageā„¢

After you decide on a Teradata Vantage security strategy, you should document a formal security policy, including:

  • An overview of site security needs
  • A description of the security procedures that meet the needs
  • Specifics of the Vantage security implementation, including:
    • A brief overview of the security functions
    • A list of required security procedures and actions, who is responsible for them, and who they are likely to affect
    • Explanation of the authentication and authorization strategy, including logon options, such as single sign-on
    • Database monitoring and auditing principles
    • Database security restrictions and management policy for security violations
  • A list of contacts who can answer security questions

Depending on the complexity of your security implementation, you may also want to create a user-level instruction sheet or handbook that describes user security requirements, procedures, and restrictions.