Lesson 8: Information Security

This chapter provides an introduction to the purpose and scope of information security. Basic concepts are introduced for developing security solutions that meet your business needs. Esri's information patterns share how to establish security measures appropriate for your organization.

Reference documentation

 * 1) What is information security?
 * 2) Esri security strategy evolution
 * 3) ArcGIS Server: Authorization deployment scenarios
 * 4) Portal: Authentication deployment scenarios
 * 5) ArcGIS Online security authentication and authorization
 * 6) Portal for ArcGIS security authentication and authorization
 * 7) Portal distributed collaboration
 * 8) Esri’s security strategy

Reference documentation

 * 1) Business continuance
 * 2) *Business continuance: Server GIS components
 * 3) *Business continuance: Portal for ArcGIS components
 * 4) *Business continuance: ArcGIS Data Store components
 * 5) *Business continuance: Web GIS components
 * 6) Security strategy overview

Security strategy overview
Security is everybody's job, there is no exception. The world is not a secure environment, and you need to keep your eyes and minds open to the threats around you.

There is no single solution for security.
 * There are costs and trade-offs that must be made to support an optimum solution.
 * Too much security controls can reduce productivity and increase cost.
 * Too little attention and control can result in loss of property and the ability to perform.

Note: There is no CPT exercise for this lesson.

"Best practice: Questions on SADSwiki content can be answered through the GeoNet Implementing GIS Architecture and Security forum."

Page Footer
Specific license terms for this content System Design Strategies 26th Edition - An Esri ® Technical Reference Document • 2009 (final PDF release)