{"id":10807,"date":"2020-09-11T08:15:06","date_gmt":"2020-09-11T08:15:06","guid":{"rendered":"https:\/\/beta.bluetab.net\/modelo-de-seguridad-plataforma-informacional\/"},"modified":"2021-07-01T14:30:20","modified_gmt":"2021-07-01T14:30:20","slug":"unified-risk-system","status":"publish","type":"post","link":"https:\/\/www.bluetab.com\/en\/unified-risk-system\/","title":{"rendered":"Unified Risk System"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"10807\" class=\"elementor elementor-10807\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-854e540 elementor-section-stretched elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"854e540\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;stretch_section&quot;:&quot;section-stretched&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-e55bd9d\" data-id=\"e55bd9d\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-0bccf98 elementor-widget elementor-widget-theme-post-title elementor-page-title elementor-widget-heading\" data-id=\"0bccf98\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"theme-post-title.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Unified Risk System<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-b716fb6 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"b716fb6\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-286d088\" data-id=\"286d088\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2087361 elementor-widget elementor-widget-text-editor\" data-id=\"2087361\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Within financial institutions, the Data Units or Information Systems areas develop reports and scorecards to facilitate user areas\u2019 work. Once the reports are in production, a security and governance framework needs to be established that defines the permissions for access to them.<\/p><p>In this context, Bluetab is developing the information access model, determining the criteria for controlling access to the data:<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e2eadfd elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"e2eadfd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" id=\"Capa_1\" data-name=\"Capa 1\" viewBox=\"0 0 113.39 113.39\"><defs><style>.cls-1{fill:#e76118;}<\/style><\/defs><title>barra-bluetab<\/title><path class=\"cls-1\" d=\"M73.6,4.18c-.08,0,0,0-.08,0a10.35,10.35,0,0,0-9.59,6.5L26.86,109.2H39.79c.07,0,0,0,.07,0a10.41,10.41,0,0,0,9-5.15L86.53,4.18Z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Access restriction. Establishing which users can access which reports (e.g. the Risks User can access the RDA Scorecard).<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" id=\"Capa_1\" data-name=\"Capa 1\" viewBox=\"0 0 113.39 113.39\"><defs><style>.cls-1{fill:#e76118;}<\/style><\/defs><title>barra-bluetab<\/title><path class=\"cls-1\" d=\"M73.6,4.18c-.08,0,0,0-.08,0a10.35,10.35,0,0,0-9.59,6.5L26.86,109.2H39.79c.07,0,0,0,.07,0a10.41,10.41,0,0,0,9-5.15L86.53,4.18Z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Data restriction. Indicating, within a report, what data can be accessed (e.g. an office manager can only view the data for their office).<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\"><\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-8128163\" data-id=\"8128163\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-6dcf888 elementor-widget elementor-widget-theme-post-featured-image elementor-widget-image\" data-id=\"6dcf888\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"theme-post-featured-image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"1024\" height=\"673\" src=\"https:\/\/www.bluetab.com\/wp-content\/uploads\/2020\/09\/neonbrand-mgyar7bzbk4-unsplash-scaled.jpeg\" class=\"attachment-large size-large wp-image-4336\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<div class=\"elementor-element elementor-element-7065312 elementor-widget elementor-widget-text-editor\" data-id=\"7065312\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7065312 elementor-widget elementor-widget-text-editor\" data-id=\"7065312\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\"><div class=\"elementor-widget-container\"><div class=\"elementor-text-editor elementor-clearfix\"><p>In this context, Bluetab is developing the security model for the reports of a leading Spanish financial institution by implementing two types of security levels, and enabling this to provide coverage to the various group entities:<\/p><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-583fead elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"583fead\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" id=\"Capa_1\" data-name=\"Capa 1\" viewBox=\"0 0 113.39 113.39\"><defs><style>.cls-1{fill:#e76118;}<\/style><\/defs><title>barra-bluetab<\/title><path class=\"cls-1\" d=\"M73.6,4.18c-.08,0,0,0-.08,0a10.35,10.35,0,0,0-9.59,6.5L26.86,109.2H39.79c.07,0,0,0,.07,0a10.41,10.41,0,0,0,9-5.15L86.53,4.18Z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\"> Access Security: managed through Catalogue Groups, as a method of organisation to which users can be assigned while giving access to the various scorecard elements. Therefore, these groups will allow a user or users to access a report, or not. Users are associated with a tool catalogue group with access to a particular set of reports.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" id=\"Capa_1\" data-name=\"Capa 1\" viewBox=\"0 0 113.39 113.39\"><defs><style>.cls-1{fill:#e76118;}<\/style><\/defs><title>barra-bluetab<\/title><path class=\"cls-1\" d=\"M73.6,4.18c-.08,0,0,0-.08,0a10.35,10.35,0,0,0-9.59,6.5L26.86,109.2H39.79c.07,0,0,0,.07,0a10.41,10.41,0,0,0,9-5.15L86.53,4.18Z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\"> Data Security: managed through Application Roles, as a feature that enables control over what data a user or users assigned to the role can or cannot query. Therefore, these roles will allow, or not, a user to view detailed information on data at the customer or office level. However, users will always be able to view aggregated information.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\"><\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-046ed20 elementor-widget elementor-widget-text-editor\" data-id=\"046ed20\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>This project has been carried out within the institution\u2019s technological stack, implementing the security model in OBIEE.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-197ce63 elementor-section-stretched elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"197ce63\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;stretch_section&quot;:&quot;section-stretched&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-194ae23\" data-id=\"194ae23\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-f28ca3e elementor-widget elementor-widget-text-editor\" data-id=\"f28ca3e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>SUCCESS STORIES<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c23ce05 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"c23ce05\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Within financial institutions, the Data Units or Information Systems areas develop reports and scorecards to facilitate user areas\u2019 work. Once the reports are in production, a security and governance framework needs to be established that defines the permissions for access to them. In this context, Bluetab is developing the information access model, determining the criteria [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":4336,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"elementor_header_footer","format":"standard","meta":{"inline_featured_image":false,"_uag_custom_page_level_css":"","_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[605],"tags":[607],"class_list":{"0":"post-10807","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-casos-2","8":"tag-data-fabric-2","9":"entry"},"uagb_featured_image_src":{"full":["https:\/\/www.bluetab.com\/wp-content\/uploads\/2020\/09\/neonbrand-mgyar7bzbk4-unsplash.jpeg",4654,3059,true],"thumbnail":["https:\/\/www.bluetab.com\/wp-content\/uploads\/2020\/09\/neonbrand-mgyar7bzbk4-unsplash-scaled.jpeg",150,99,false],"medium":["https:\/\/www.bluetab.com\/wp-content\/uploads\/2020\/09\/neonbrand-mgyar7bzbk4-unsplash-scaled.jpeg",300,197,false],"medium_large":["https:\/\/www.bluetab.com\/wp-content\/uploads\/2020\/09\/neonbrand-mgyar7bzbk4-unsplash-scaled.jpeg",768,505,false],"large":["https:\/\/www.bluetab.com\/wp-content\/uploads\/2020\/09\/neonbrand-mgyar7bzbk4-unsplash-scaled.jpeg",1024,673,false],"1536x1536":["https:\/\/www.bluetab.com\/wp-content\/uploads\/2020\/09\/neonbrand-mgyar7bzbk4-unsplash-scaled.jpeg",1536,1010,false],"2048x2048":["https:\/\/www.bluetab.com\/wp-content\/uploads\/2020\/09\/neonbrand-mgyar7bzbk4-unsplash-scaled.jpeg",2048,1346,false],"sidebar-featured":["https:\/\/www.bluetab.com\/wp-content\/uploads\/2020\/09\/neonbrand-mgyar7bzbk4-unsplash-scaled.jpeg",75,49,false],"genesis-singular-images":["https:\/\/www.bluetab.com\/wp-content\/uploads\/2020\/09\/neonbrand-mgyar7bzbk4-unsplash-scaled.jpeg",702,461,false]},"uagb_author_info":{"display_name":"Bluetab","author_link":"https:\/\/www.bluetab.com\/en\/author\/user\/"},"uagb_comment_info":0,"uagb_excerpt":"Within financial institutions, the Data Units or Information Systems areas develop reports and scorecards to facilitate user areas\u2019 work. Once the reports are in production, a security and governance framework needs to be established that defines the permissions for access to them. In this context, Bluetab is developing the information access model, determining the criteria&hellip;","_links":{"self":[{"href":"https:\/\/www.bluetab.com\/en\/wp-json\/wp\/v2\/posts\/10807","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.bluetab.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.bluetab.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.bluetab.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.bluetab.com\/en\/wp-json\/wp\/v2\/comments?post=10807"}],"version-history":[{"count":4,"href":"https:\/\/www.bluetab.com\/en\/wp-json\/wp\/v2\/posts\/10807\/revisions"}],"predecessor-version":[{"id":10811,"href":"https:\/\/www.bluetab.com\/en\/wp-json\/wp\/v2\/posts\/10807\/revisions\/10811"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.bluetab.com\/en\/wp-json\/wp\/v2\/media\/4336"}],"wp:attachment":[{"href":"https:\/\/www.bluetab.com\/en\/wp-json\/wp\/v2\/media?parent=10807"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.bluetab.com\/en\/wp-json\/wp\/v2\/categories?post=10807"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.bluetab.com\/en\/wp-json\/wp\/v2\/tags?post=10807"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}