Wednesday, 3 November 2010

Summery of "BPM and Security" ..


It is a white paper prepared by the BPMInstitute.org.

The paper was mainly focusing on showing and proving that processes will exceed the organization's boundaries .. and can not be performed fully with in the organization's walls.
"50% of planed BPM projects involve extending the process outside the firewall to a customer, partner, or suppliers."
The paper then listed some of the security requirements that should be in place if the process is exceeding the organization's walls; including protecting content from unauthorized access, assuring that the content came from the stated author, detecting altering of content, and maintaining the document security through out the whole process, including when exceeding the organization's firewalls. Then went in to explaining how important and also difficult it is to satisfy these requirements.


After that  it talked about a survey done by the BPMInstitute.org to show the importance of the issues and the challenges they faced with respect to extending BPM beyond the firewall.


and then the paper talked about some technical solutions that can help in satisfying some of the security requirements; such as "encryption" and rights management.


Finally the paper ended by showing an example of how an organization can manage to be secure without neglecting any other aspect.

No comments:

Post a Comment