Price: 650000
Number of applications: 4
19.05.26 (inclusive)
Payment in cash (tenge)
Idea
ICT tasks
Electric power industry
Digital Security Technologies
Software/ IS
At the current design stage, it is necessary to determine in advance the correct model for access differentiation between different types of users, as well as to understand how best to organize logging of actions within the system. It is important to provide for recording inputs, changes, deletion and editing of data, as well as basic mechanisms for monitoring suspicious activity. It is necessary to obtain recommendations on the architecture in order to avoid further mistakes in the implementation and refinement of the information system.
As a result of the consultation, it is expected to receive practical recommendations on the secure architecture of the system, the structure of roles and access rights, as well as on the organization of logging and monitoring user actions. This will make it possible to establish a more stable and understandable security model at an early stage of design and reduce the risks of subsequent rework during system development.
Маликов Султан Сахтарович
Purpose and description of task (project)
Expert advice is required on the design of access architecture, user rights differentiation, and logging of actions in a corporate information system used for internal work with data and documents. As part of the task, you need to get recommendations on the secure organization of roles, event accounting, log storage, change control, and basic requirements for protecting user sessions. I am interested in a practical approach that can be used in the further development and implementation of the system.