Manage Learn to apply best practices and optimize your operations.

Is user authentication necessary to include in DR plans?

Independent disaster recovery expert Paul Kirvan discusses user authentication in disaster recovery plans in this Expert Answer.

Should user authentication be considered as a part of a DR plan?

User authentication -- or lack of it -- can cause a system disruption if it grants access to an unauthorized user. As such it could become an issue in DR plans, only if it directly results in a system disruption. It is more likely to be addressed in an information security management plan

Two-factor authentication is generally accepted as a satisfactory strategy for access management. Advanced solutions for access management, such as password management tools, keystroke monitoring systems, biometrics and voice recognition can be used, but represent an added investment that may (or may not) generate a commensurate added level of protection. 

This was last published in October 2013

Dig Deeper on Disaster recovery planning - management

Have a question for an expert?

Please add a title for your question

Get answers from a TechTarget expert on whatever's puzzling you.

You will be able to add details on the next page.

Start the conversation

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.