The webinar "Hands-on: Arm your data and authorization structure against unauthorized access", which took place on November 19.11.2024, XNUMX, was dedicated to optimizing data and authorization structures to ensure security, efficiency and compliance. The main content can be summarized as follows:
Introduction and context
The webinar started with an overview of the problems of historically grown file servers and their security risks. It was explained how outdated structures can lead to inefficiency and security gaps.
Obsolete Data and Data Retention
One focus was on identifying and archiving obsolete data. It was shown how archiving old data can reduce the volume by up to 64%, which speeds up recovery in an emergency and increases clarity.
analysis tools and visualization
Various tools were presented, including the 3D data heatmap and authorization analysis reports to identify problematic structures and uncover optimization potential.
authorization management and compliance
Permission management was highlighted as a key factor for security and compliance. It was recommended to simplify permission structures, avoid inheritance breaks and reduce direct permissions.
Data Owner and Responsibilities
A central aspect was the role of data owners, who are responsible for maintaining authorizations and assuming responsibility for their data. Practical tips on establishing responsibilities were given.
practical examples and expert tips
Using practical examples, strategies for introducing modern data structures were presented, including the implementation of regular data retention policies and targeted data cleansing.
conclusion and question and answer session
The webinar ended with a question and answer session in which participants' specific questions about archiving, authorization management and other functions of migRaven.one were answered.
This webinar provided a practical demonstration of how companies can increase their security standards, meet compliance requirements and at the same time increase the efficiency of their employees by optimizing their data and authorization structures.