Should user authentication be considered as a part of a DR plan?
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
User authentication -- or lack of it -- can cause a system disruption if it grants access to an unauthorized user. As such it could become an issue in DR plans, only if it directly results in a system disruption. It is more likely to be addressed in an information security management plan.
Two-factor authentication is generally accepted as a satisfactory strategy for access management. Advanced solutions for access management, such as password management tools, keystroke monitoring systems, biometrics and voice recognition can be used, but represent an added investment that may (or may not) generate a commensurate added level of protection.
Dig Deeper on Disaster Recovery Planning-Management
Related Q&A from Paul Kirvan
You should be able to justify the need for a BC/DR plan. But here's what you can do if you fail to get management buy-in and you still want disaster ...continue reading
While it's always safer for businesses to have properly funded DR plan testing, there are ways to assess your plan even when the data storage budget ...continue reading
For those organizations that believe 'It will never happen to me,' options to a formal business continuity/disaster recovery plan do exist if the ...continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.