Should user authentication be considered as a part of a DR plan?
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
User authentication -- or lack of it -- can cause a system disruption if it grants access to an unauthorized user. As such it could become an issue in DR plans, only if it directly results in a system disruption. It is more likely to be addressed in an information security management plan.
Two-factor authentication is generally accepted as a satisfactory strategy for access management. Advanced solutions for access management, such as password management tools, keystroke monitoring systems, biometrics and voice recognition can be used, but represent an added investment that may (or may not) generate a commensurate added level of protection.
Dig Deeper on Disaster recovery planning - management
Related Q&A from Paul Kirvan
If you're considering software-defined networking in your disaster recovery platform, define your DR requirements first. SDN can help support data ...continue reading
A call tree can be an important piece of disaster recovery planning. Follow these steps for call tree design and execution to ensure your company is ...continue reading
Emergency communications is one of the first actions to be taken following an incident. Find out what happens when an organization doesn't have an ...continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.