
Information Security Approval Matrix: Bringing Order to Complexity
Approval authority can be extremely complex. Information security offices are asked daily to view, gather, investigate, retrieve, export, forward, disable, enable, provision, de-provision, delegate, create, remove, block, allow, playback, hide, or redact all kinds of information, accounts, devices, networks, files, applications, email, calendars, video, phones, and door access. The office of authority to approve these actions varies based on the type and sensitivity of the data involved. Approval can be at a department or division level. It may be the data owner, human resources, student affairs, academic integrity, the provost, law enforcement, or even the legal office. In some cases, approval is dictated by compliance requirements. This session introduces and shares a convenient and simple tool that provides direction on the execution of Miami University’s Information Security Approval Matrix (ISAM). The ISAM is based on common or expected cyber-related events or messaging in a clear, concise, and consistent fashion.