This checklist will guide you to implement your EDRM project successfully
While EDRM is the only solution available to solve the security problems of unstructured data, oftentimes the term EDRM itself is the most dreaded one for many organizations. This is because many EDRM projects have failed miserably.
These projects have failed because of overzealous policies, loss of control over the policies, and no proper implementation guidelines. This oftentimes leads to access being denied to those who are authorized to have access.
With more than two decades of experience in data-centric security solutions, we have created a checklist for you to successfully implement an EDRM project .
Most often EDRM projects fail because there is either an overabundance of policies or policies are not properly defined. It is not enough if the policies alone are well-defined, their enforcement rules must also be centrally defined and as far as possible must be automated.
If users are allowed full rights to the project without any proper guiding policies, then it would be difficult for each user to make the right decisions. If possible these rules must be similar to the already existing access rules so that the user is not confused with too many new rules and regulations.
All users may not be very good at understanding the complex nature of the different data security concepts, data classification, encryption, etc. When they find it difficult to understand they may ignore the tools.
Proper understanding and training of access management, unstructured data flow, the complexity of the project with it many dependencies like applications, data, identity, connectivity, different policies, etc., is very essential to execute the EDRM project successfully.
Generally complex and huge projects require a top-level executive buy-in. This is because a lot of money, time, and resources are involved in such projects. Therefore, when you want to implement an EDRM project it is better to get the support of top executives. Executive buy-in is essential to understand the impact of the project and also such projects may involve organizational/cultural changes.
It is always better to develop use cases for EDRM projects because EDRM products with a narrow focus will not meet all the requirements of the modern digital workspace.
When documenting use cases, it is critical to discuss several things such as objects in scope, application support, file origination, activities and toolsets that may be required when an organization decides to abort the EDRM project, data affiliation, EDRM affiliation, roles of users and administrators, application rollout, unmanaged devices, device type, vendor access, cloud access, inheritance, external collaboration, etc.
EDRM solution design is more than just product selection. The solution architects should understand the various EDRM technology components, and requirements of clients, servers, and the network. They should also plan for integrations with security products, business applications, and also endpoint applications.
Start your EDRM project rollout with a small initial rollout and don’t be too overly ambitious. Include a few data asset types and user groups and maybe a single department. Draw your inference from this small scope and then expand it to a larger project.
Keep your policies simple and document all procedures. Consider your legacy content, the recovery process, and bulk decryption too. Have a training schedule designed for all your users.
It is during the actual implementation process that you will discover real workflows in the organization as opposed to what you think they are. Mitigate all issues before deployment. Provide the right tools to your users and educate them to make the right decisions. Be ready to solve issues that crop up. As much as possible reuse what works.
Carefully monitor the project. Check for any anomalies and rectify them immediately. Over time there is a tendency to keep adding more policies or policies will be changed without proper oversight. Don’t allow such policy sprawls. Detect them early and curb them.
Be very cautious while expanding the scope of the project. Plan for UATs on each expansion of scope.
If you follow the steps carefully then you can avoid all the pitfalls and be sure of a successful EDRM implementation. Here are some common pitfalls that that you should be wary about.
Planning and implementing the EDRM project is a challenge. However, if you are careful in your planning process and consider all the above points, you can avoid pitfalls and limitations in your EDRM project.
Microsoft Azure Information Protectionis the most popular EDRM product. It is easy to test and all components are readily available.
Microsoft’s partner, SECUDE is a leading data-centric security provider for protecting SAP data and CAD data protection. Our products and solutions apply appropriate labeling and protection defined in Microsoft Information Protection (MIP), the de-facto standard for rights management to the data and files downloaded from SAP and CAD software.
To learn more about how you can leverage Microsoft EDRM for your SAP and CAD data and automate data protection email us at contact@secude.com