Identity Defined Security Alliance

Putting Identity at the Center of Security

Profile-based Data Security

Provide feedback on Profile-based Data Security Control -

Does it meet a requirement in your organization?
Have you implemented it with IDSA vendors or other technology vendors?
What was your experience?
What are tips/best practices?
Other feedback?