Should user authentication be considered as a part of a DR plan?
User authentication -- or lack of it -- can cause a system disruption if it grants access to an unauthorized user. As such it could become an issue in DR plans, only if it directly results in a system disruption. It is more likely to be addressed in an information security management plan.
Two-factor authentication is generally accepted as a satisfactory strategy for access management. Advanced solutions for access management, such as password management tools, keystroke monitoring systems, biometrics and voice recognition can be used, but represent an added investment that may (or may not) generate a commensurate added level of protection.
Dig deeper on Disaster Recovery Planning-Management
Related Q&A from Paul Kirvan
If you are running a small business that relies heavily on Google Apps, can you be sure your data is safe? Is there anything available to protect ...continue reading
What's the best place to start with small business disaster recovery? What should small businesses do first? Once something is in place, how can they...continue reading
Paul Kirvan says that reminding senior management of the last disaster and impact to the organization is one way to get upper management buy-in for ...continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.