1 / 59

Secure Access (SA)

Secure Access (SA). An Introduction to Secure Access Gale McNiff . Background to Secure Access (SA).

kelli
Download Presentation

Secure Access (SA)

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Secure Access (SA) An Introduction to Secure Access Gale McNiff

  2. Background to Secure Access (SA) • The Department, through Data and Statistics Division (DSD), collects a wide range of data from schools and Local Authorities using a number of information systems. Much of the data is collected at individual level and is therefore sensitive, personal information. This is protected with a secure login facility but this is no longer sufficient for our needs. • We currently use “Authentix” password management software to provide common Secure Access to our data tools. For a long time, this was deemed appropriate to our business and security needs, particularly as policy was tightly concerned with reducing the burdens on schools by the provision of a single, common, password. However, after the Hannigan report, and the subsequent refocusing of security across Government, this level of protection is no longer regarded as sufficient. • Hanniganreport – Data Handling Procedures in Government, 6 March 2008. The report makes recommendations in how data handling should be carried out in Government following the loss of data by HMRC.

  3. ISSUES • No formal global exercise to get schools to reset their Authentixpasswords has ever taken place since system inception, so the sign on details in some schools might be known by multiple administrators, some whom might no longer work there. • Furthermore, Authentix’ old technology does not encrypt user credentials, which are instead held in plain text. This makes them a relatively easy target if the system is compromised. Together, these issues leave the Department exposed to the risk that someone might gain unauthorised access to identifiable child data. • However, there has been significant password churn during this period as schools often contact the DSD helpdesk to get the password reset.

  4. Moving Forward • The need to secure our current data systems and provide a ‘future proof’ platform to manage access to new systems gave rise to the ‘Secure Access’ project, led jointly by DSD and Chief Information Officer’s Group (CIOg). • For schools, SA will give access to S2S, COLLECT & K2S. For LA colleagues this will give access to S2S and COLLECT. LA colleagues will continue to use EAS to access Key to Success (KtS). • Secure Access will ‘Go Live’ on the 10th December.

  5. Secure Access (SA) • We have migrated all current schools, LA personnel who use S2S and/or COLLECT. • On first log in users will log in using their COLLECT username & password and the PIN number provided. • Schools will retrieve their PIN number from EduBase:-https://www.education.gov.uk/EduBase/login.xhtml • LA colleagues will receive an e-mail with their PIN. • PIN numbers will be available from 31st October

  6. Retrieving Pin from EduBase

  7. Retrieving Pin from EduBase

  8. Retrieving Pin from EduBase

  9. Retrieving Pin from EduBase

  10. Retrieving Pin from EduBase

  11. Retrieving Pin from EduBase

  12. Secure Access

  13. Secure Access

  14. Secure Access

  15. Secure Access

  16. Secure Access

  17. Secure Access

  18. Secure Access

  19. Secure Access

  20. Secure Access

  21. Secure Access

  22. Secure Access

  23. Secure Access - Home Page (Schools)

  24. Secure Access – Home Page (LA)

  25. Secure Access

  26. Secure Access

  27. Secure Access

  28. Secure Access

  29. Secure Access

  30. Secure Access

  31. Secure Access

  32. Secure Access

  33. Secure Access

  34. Secure Access

  35. Secure Access

  36. Secure Access

  37. Secure Access

  38. Secure Access

  39. Secure Access

  40. Secure Access

  41. Secure Access

  42. Secure Access

  43. Secure Access

  44. Secure Access

  45. Secure Access

  46. Secure Access

  47. Secure Access

  48. Secure Access

  49. Secure Access

  50. Secure Access

More Related