There are a number of different departments and groups that are engaged in the administration of the network and the components that make up the network inside the operational structure of a communication service provider (csp). Establishing user accounts and user groups, each with their own unique access responsibilities and privileges is what is meant by the term “ems nms security management.” The capability to construct various groups that may access and administer the network components, in addition to assigning specific staff responsibilities and access rights, is a feature that is obligatory for communications service providers (CSPs) to have in their nms ems. In addition, the user’s activities should be documented and made available for review and analysis so that they may be better understood. It is essential to be able to record the activities of users, particularly in situations where there has been a breach of security or if user actions need to be undone. a few guidelines for the implementation of security measures in the construction of network element management software the following content In the process of developing network element management software, security management rules are developed for users, their responsibilities, and the groups to which they belong: group management: a user may be assigned to a certain group, such as “field staff,” “service configuration,” “product line management,” “order administration,” or “technical assistance.” Examples of other groups are “product line management” and “service configuration.” Each group has its own distinct capacity for creation, deletion, and modification. user management encompasses the process of creating and managing EMS users in addition to the setup of trustworthy client end points. Standard security features include monitoring user activity, recovering lost passwords, locking users out of their accounts, and even allowing users to delete themselves. the creation and ems nms administration of roles, such as configuring network elements and providing network elements, falls within the purview of role-based management. The following scenarios are examples of the usual functions performed by an EMS system: • the administrator job grants unrestricted access to everything • fault managed role – alarm management privileges including the ability to inspect, assign alarm(s), and access event logs • Provisioning of network components falls within the purview of the responsibility of the configuration manager. • The security manager job allows you to establish user accounts and examine all of their data as well as security logs. • Report Manager Role, which includes the ability to plan and examine reports; User Role Assignment Several distinct responsibilities may be delegated to the same user. User roles may be merged together to form a hierarchy, in which higher-level roles take ownership of the permissions formerly held by lower-level roles. An integrated security management module should be included in any network element management software development. This module should cover all of the following rules, including user access credentials, user/password assignments, managing user roles/groups and privileges, tracking and maintaining a history of security access, configuring specific user/group views based on access right privileges, audit logs, and a full suite of role based management and role assignment capabilities. nocvueTM, which is a market leader among element management system (ems) and network management system (nms) solutions, has this method of security management in its functionality. raj singh, chief evangelist of nocvue , is the author of the element management system.

I love myBlogd

Leave a Reply

All rights reserved. ®