<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: folder architecture and security -recommendations in Architecture</title>
    <link>https://communities.sas.com/t5/Architecture/folder-architecture-and-security-recommendations/m-p/562006#M181</link>
    <description>Solution 2 is your best option and easiest to maintain going forward. Set security at the highest folder, and as new data is added it carries the rights within the folders</description>
    <pubDate>Tue, 28 May 2019 15:59:17 GMT</pubDate>
    <dc:creator>CJac73</dc:creator>
    <dc:date>2019-05-28T15:59:17Z</dc:date>
    <item>
      <title>folder architecture and security -recommendations</title>
      <link>https://communities.sas.com/t5/Architecture/folder-architecture-and-security-recommendations/m-p/512277#M11</link>
      <description>&lt;P&gt;We are moving to a new platform and need to decide how the folder/security setup is best handled.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We have some confident data which only a few of our DI developers must see and develop on. However there is a lot of other data all developers are allowed to see.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;How is that managed best in the DWH folder structure as we do not want to minimize time on security issues…?? please specify in detail the security setup what model is best and why ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks in advance.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;It looks like this today:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;U&gt;Solution 1&lt;/U&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;DWH&lt;/P&gt;&lt;P&gt;- data&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ---subject1&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ---subject2&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ---subject3&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ---subject4&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; --confident subject1&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; --confident subject2&lt;/P&gt;&lt;P&gt;- jobs&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ---subject1&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ---subject2&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ---subject3&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ---subject4&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; --confident subject1&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; --confident subject2&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Could it be better with this solution as the secuty could be set on higher level and I do not need to use a di developer denied?? On the confident folders on solution 1??&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;U&gt;Solution 2&lt;/U&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;DWH&lt;/P&gt;&lt;P&gt;- data&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ---subject1&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ---subject2&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ---subject3&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ---subject4&lt;/P&gt;&lt;P&gt;- jobs&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ---subject1&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ---subject2&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ---subject3&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ---subject4&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;DWH_confident&lt;/P&gt;&lt;P&gt;- data&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; --confident subject1&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; --confident subject2&lt;/P&gt;&lt;P&gt;- jobs&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; --confident subject1&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; --confident subject2&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 12 Nov 2018 17:41:19 GMT</pubDate>
      <guid>https://communities.sas.com/t5/Architecture/folder-architecture-and-security-recommendations/m-p/512277#M11</guid>
      <dc:creator>ANLYNG</dc:creator>
      <dc:date>2018-11-12T17:41:19Z</dc:date>
    </item>
    <item>
      <title>Re: folder architecture and security -recommendations</title>
      <link>https://communities.sas.com/t5/Architecture/folder-architecture-and-security-recommendations/m-p/512854#M12</link>
      <description>&lt;P&gt;I would prefer your solution 2.&lt;/P&gt;
&lt;P&gt;I will always try to set the security on as high a folder level as possible and since solution 2 only requires you to set it on the DWH_confident folder.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Another variation might be this:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;DWH&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;-subject1&lt;/P&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp;- data&lt;/P&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp;- jobs&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;-subject2&lt;/P&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp;- data&lt;/P&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp;- jobs&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;-subject3&lt;/P&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp;- data&lt;/P&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp;- jobs&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;-confident_subject1&lt;/P&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp;- data&lt;/P&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp;- jobs&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;-confident_subject2&lt;/P&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp;- data&lt;/P&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp;- jobs&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Then security would be DI Developers on the DWH folder and on the confident_subjectX folders.&lt;/P&gt;
&lt;P&gt;I still like the solution 2 the best.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 14 Nov 2018 07:29:05 GMT</pubDate>
      <guid>https://communities.sas.com/t5/Architecture/folder-architecture-and-security-recommendations/m-p/512854#M12</guid>
      <dc:creator>MichaelLarsen</dc:creator>
      <dc:date>2018-11-14T07:29:05Z</dc:date>
    </item>
    <item>
      <title>Re: folder architecture and security -recommendations</title>
      <link>https://communities.sas.com/t5/Architecture/folder-architecture-and-security-recommendations/m-p/562006#M181</link>
      <description>Solution 2 is your best option and easiest to maintain going forward. Set security at the highest folder, and as new data is added it carries the rights within the folders</description>
      <pubDate>Tue, 28 May 2019 15:59:17 GMT</pubDate>
      <guid>https://communities.sas.com/t5/Architecture/folder-architecture-and-security-recommendations/m-p/562006#M181</guid>
      <dc:creator>CJac73</dc:creator>
      <dc:date>2019-05-28T15:59:17Z</dc:date>
    </item>
    <item>
      <title>Re: folder architecture and security -recommendations</title>
      <link>https://communities.sas.com/t5/Architecture/folder-architecture-and-security-recommendations/m-p/562011#M183</link>
      <description>&lt;P&gt;Solution 2 is nice, as long as you know that:&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;you will always want all developers to be able to see all of the DWH data.&lt;/LI&gt;
&lt;LI&gt;you will always want the same subset of developers to be able to view all of the DWH_confident data&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;So solution 2 would break down if you add a third confidential subject, and it's you want a different subset of developers to be able to see that data than can see confidential subject1.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If the number of subjects is low, I tend to use:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;DWH&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;-subject1&lt;/P&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp;- data&lt;/P&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp;- jobs&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;-subject2&lt;/P&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp;- data&lt;/P&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp;- jobs&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;-subject3&lt;/P&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp;- data&lt;/P&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp;- jobs&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;-confident_subject1&lt;/P&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp;- data&lt;/P&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp;- jobs&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;-confident_subject2&lt;/P&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp;- data&lt;/P&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp;- jobs&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;That way all of the subjects can inherit security from the DWH folder, and each subject can impose stricter security. The cost is that each time you create a new confidential subject, you need to specify the group(s) that can see it rather than rely on the inherited security.&lt;/P&gt;</description>
      <pubDate>Tue, 28 May 2019 16:38:35 GMT</pubDate>
      <guid>https://communities.sas.com/t5/Architecture/folder-architecture-and-security-recommendations/m-p/562011#M183</guid>
      <dc:creator>Quentin</dc:creator>
      <dc:date>2019-05-28T16:38:35Z</dc:date>
    </item>
    <item>
      <title>Re: folder architecture and security -recommendations</title>
      <link>https://communities.sas.com/t5/Architecture/folder-architecture-and-security-recommendations/m-p/565309#M187</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://communities.sas.com/t5/user/viewprofilepage/user-id/26102"&gt;@ANLYNG&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;We use a structure, where we rely on heritance from the top level, and it works very well. We never need to set individual permissions on any object apart from defining and setting a new Protected-AD group on a new subject in the protected area. All Protected-AD groups contain an Administrator group together with individual members or Organizational groups, and all group maintenance is done i AD by the user Administration Department and updated i SAS in daily batch.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The logical structure is mirrored in the physical data structure, where we use inheritance as well, and the maintenance is limited to setting the new AD group on a new subject folder in the protected area.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The protected area (SAS Data Beskyt) is separate from the unprotected (SAS Data Integration Studio Custom Tree) area at root level.&lt;/P&gt;
&lt;P&gt;Note: &lt;U&gt;Beskyt&lt;/U&gt; means &lt;U&gt;protect&lt;/U&gt; in danish.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-left" image-alt="main_structure.gif" style="width: 301px;"&gt;&lt;img src="https://communities.sas.com/t5/image/serverpage/image-id/30207i11B22A362682F5B5/image-size/large?v=v2&amp;amp;px=999" role="button" title="main_structure.gif" alt="main_structure.gif" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Basically we work with 3 main levels in the data warehouse: Staging, Data Warehouse and Data Mart.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The organization is different in the protected and the unprotected area, because of the need for inheritance in the protected area:&lt;/P&gt;
&lt;P&gt;The protected area&amp;nbsp;is organized as Subject - DWH Level - Data/Jobs.&lt;/P&gt;
&lt;P&gt;The unprotected area&amp;nbsp; is organized as DWH Level - Subject - Data/Jobs.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;So in principle, the structure is as follows:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-left" image-alt="principle_structure.gif" style="width: 321px;"&gt;&lt;img src="https://communities.sas.com/t5/image/serverpage/image-id/30208iD6A3CFE2BAD195D9/image-size/large?v=v2&amp;amp;px=999" role="button" title="principle_structure.gif" alt="principle_structure.gif" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Example of a structure in the protected area:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-left" image-alt="protect_structure.gif" style="width: 400px;"&gt;&lt;img src="https://communities.sas.com/t5/image/serverpage/image-id/30209iCFDB567960A2C9CF/image-size/large?v=v2&amp;amp;px=999" role="button" title="protect_structure.gif" alt="protect_structure.gif" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 11 Jun 2019 16:00:00 GMT</pubDate>
      <guid>https://communities.sas.com/t5/Architecture/folder-architecture-and-security-recommendations/m-p/565309#M187</guid>
      <dc:creator>ErikLund_Jensen</dc:creator>
      <dc:date>2019-06-11T16:00:00Z</dc:date>
    </item>
    <item>
      <title>Re: folder architecture and security -recommendations</title>
      <link>https://communities.sas.com/t5/Architecture/folder-architecture-and-security-recommendations/m-p/565793#M188</link>
      <description>&lt;P&gt;This may not be specific enough for what you are trying to achieve but i think it's worth mentioning in the grand discussion of authorization.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;There are some useful materials which talk about this subject. See:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;SUGA presentation &lt;EM&gt;&lt;STRONG&gt;SAS® Security Design Best Practices, Validation and Monitoring&lt;/STRONG&gt;&lt;/EM&gt;:&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://communities.sas.com/kntur85557/attachments/kntur85557/library/2413/1/SEP2017SUGA-Presentation.pdf" target="_blank"&gt;https://communities.sas.com/kntur85557/attachments/kntur85557/library/2413/1/SEP2017SUGA-Presentation.pdf&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;STRONG&gt;Five papers on Recommended SAS 9.4 Security Model Design&lt;/STRONG&gt;&lt;/EM&gt;:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://communities.sas.com/t5/SAS-Communities-Library/Five-papers-on-Recommended-SAS-9-4-Security-Model-Design-part-1/ta-p/361569" target="_blank"&gt;https://communities.sas.com/t5/SAS-Communities-Library/Five-papers-on-Recommended-SAS-9-4-Security-Model-Design-part-1/ta-p/361569&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://communities.sas.com/t5/SAS-Communities-Library/Five-papers-on-Recommended-SAS-9-4-Security-Model-Design-part-2/ta-p/361575" target="_blank"&gt;https://communities.sas.com/t5/SAS-Communities-Library/Five-papers-on-Recommended-SAS-9-4-Security-Model-Design-part-2/ta-p/361575&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 13 Jun 2019 10:17:33 GMT</pubDate>
      <guid>https://communities.sas.com/t5/Architecture/folder-architecture-and-security-recommendations/m-p/565793#M188</guid>
      <dc:creator>SimonWilliams</dc:creator>
      <dc:date>2019-06-13T10:17:33Z</dc:date>
    </item>
    <item>
      <title>Re: folder architecture and security -recommendations</title>
      <link>https://communities.sas.com/t5/Architecture/folder-architecture-and-security-recommendations/m-p/565998#M189</link>
      <description>&lt;P&gt;Thanks &lt;a href="https://communities.sas.com/t5/user/viewprofilepage/user-id/12684"&gt;@SimonWilliams&lt;/a&gt; for mentioning &lt;a href="https://communities.sas.com/t5/user/viewprofilepage/user-id/5018"&gt;@angieh&lt;/a&gt; and my SUGA presentation.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;a href="https://communities.sas.com/t5/user/viewprofilepage/user-id/26102"&gt;@ANLYNG&lt;/a&gt; you may also want to look at Angie's 2017 SAS Global Forum paper (and supporting document) , "Getting Started with Designing and Implementing a SAS 9.4 Metadata and File System Security Design", that goes into more detail&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://communities.sas.com/t5/SAS-Global-Forum-2017/If-you-are-interested-in-SAS-Metadata-Security-read-on/gpm-p/347025" target="_blank"&gt;https://communities.sas.com/t5/SAS-Global-Forum-2017/If-you-are-interested-in-SAS-Metadata-Security-read-on/gpm-p/347025&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Kind Regards,&lt;/P&gt;
&lt;P&gt;Michelle&lt;/P&gt;</description>
      <pubDate>Thu, 13 Jun 2019 19:47:29 GMT</pubDate>
      <guid>https://communities.sas.com/t5/Architecture/folder-architecture-and-security-recommendations/m-p/565998#M189</guid>
      <dc:creator>MichelleHomes</dc:creator>
      <dc:date>2019-06-13T19:47:29Z</dc:date>
    </item>
    <item>
      <title>Re: folder architecture and security -recommendations</title>
      <link>https://communities.sas.com/t5/Architecture/folder-architecture-and-security-recommendations/m-p/566833#M190</link>
      <description>&lt;P&gt;Just a suggestion from experience and practical customer applications.&amp;nbsp; Data usually lives longer than a project or could cross many projects/departments.&amp;nbsp; I usually separate my data libraries away from any projects or departments and then assign the security as interest in the data grows (morphs).&amp;nbsp; I document who the owns the data such as using the description to put in business owner name for the folder or library for a quick reference so that I can contact them for approval grants of access of the data and for auditing.&amp;nbsp; &amp;nbsp;If you move the data under projects or departments, you run the risk of lots of duplicate data, stale data and inaccurate reporting, and hard to manage security as well.&amp;nbsp; I just try to think of each data library as like a datamart and treat it as such.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;- Data&lt;/P&gt;
&lt;P&gt;&amp;nbsp; - library&lt;/P&gt;
&lt;P&gt;&amp;nbsp; - library2&lt;/P&gt;
&lt;P&gt;&amp;nbsp; -etc&lt;/P&gt;
&lt;P&gt;projects (cross dept)&lt;/P&gt;
&lt;P&gt;&amp;nbsp; -project&lt;/P&gt;
&lt;P&gt;&amp;nbsp; -project2&lt;/P&gt;
&lt;P&gt;department (only)&lt;/P&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp; - branch or group&lt;/P&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp; - branch&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; - project&lt;/P&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; - project2&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 18 Jun 2019 12:36:36 GMT</pubDate>
      <guid>https://communities.sas.com/t5/Architecture/folder-architecture-and-security-recommendations/m-p/566833#M190</guid>
      <dc:creator>sunfly818</dc:creator>
      <dc:date>2019-06-18T12:36:36Z</dc:date>
    </item>
  </channel>
</rss>

