LOG IN
Digital signageVideo (EasyMovie)
AUDIENCES
Shoppers
Employees
Flow
Market
resourcesCASTINGABOUTCONTACT
Centre d'aideSupportLegalCybersecuritySite map
LOG IN
Digital signageVideo (EasyMovie)
CONTACT
Latest articles
Qu'est-ce que le Retail Media et pourquoi est-il stratégique ?
Accélérateur de prise de décision dans le parcours d'achat du consommateur, le retail media connaît une forte croissance. Découvrez son fonctionnement et ses enjeux.
Read the article
Point of sale
Qu’est-ce que le flex office ? Définition, fonctionnement et bonnes pratiques
Le flex office transforme l'organisation du travail. Découvrez ses avantages, inconvénients et les meilleures pratiques pour l'adopter en entreprise.
Read the article
Internal communication
Structurer sa communication interne : les 9 étapes essentielles
Découvrez une méthode en 9 étapes pour structurer votre communication interne, renforcer l’engagement et impliquer durablement vos collaborateurs.
Read the article
Communication
Digital out of home - publicité commerciales
Les avantages d’une régie publicitaire DOOH pour maximiser les performances des campagnes
Découvrez comment une régie publicitaire spécialisée DOOH optimise l'affichage dynamique pour maximiser la visibilité et renforcer le rayonnement d’une marque.
Read the article
Digital Signage
Monetize and monetize in-store screens
Digital signage screens are communication spaces with high monetization potential. Find out how to monetize your screens.
Read the article
Digital Signage
Point of sale
L’évolution des moyens de communication à l’ère du digital
L’évolution des moyens de communication s’accélère avec le digital. Découvrez les tendances clés et leurs impacts sur les entreprises.
Read the article
Digital Signage
Comment choisir le moyen de communication adapté à votre entreprise ?
Découvrez comment choisir le bon moyen de communication en entreprise : interne, externe, digital ou traditionnel, et optimisez votre stratégie.
Read the article
Internal communication
Montage vidéo : conseils et outils de création
Découvrez les meilleurs conseils et outils pour le montage vidéo afin de créer des contenus captivants et professionnels facilement.
Read the article
Video
Video tutorials
Comment faire un plan de communication ? 10 étapes
Voici les 10 étapes à suivre pour construire un plan de communication efficace et rapidement actionnable par votre entreprise.
Read the article
Communication
Zero-click content : qu'est ce que c'est, et pourquoi en créer ?
Découvrez comment créer du contenu "zero click" efficace pour attirer et engager votre audience sans qu'ils aient besoin de cliquer pour plus d'informations.
Read the article
Video
See all articles
CONTACT
MENU
This is some text inside of a div block.
This is some text inside of a div block.
This is some text inside of a div block.
This is some text inside of a div block.
This is some text inside of a div block.

This policy ensures that access to sensitive information and systems is granted based on the principle of least privilege and helps to mitigate the risk of unauthorized access.

‍

Identity and Access Management (IAM)

Cenareo maintains documented processes for Identity and Access Management (IAM) for both internal and external users.

The IAM program is subject to regular review and updates to reflect changes in technology, industry best practices, and regulatory requirements.

These processes cover the entire user lifecycle, including:

  • Joiners: New employee accounts are created with appropriate access rights based on their job role and responsibilities.
  • Movers:Whenanemployee's role or department changes, their access rights are reviewed and adjusted accordingly.
  • Terminations: Upon termination of employment, all user accounts and access privileges are promptly disabled or deleted.
  • External Users: Access for external users (contractors, vendors, etc.) is granted based on the principle of least privilege and the specific needs of their role.

‍

Access Recertification

Access rights for all users (internal and external) are reviewed and recertified periodically to ensure continued need and adherence to the principle of least privilege.

‍

Role-Based Access Control (RBAC)

We implement Role-Based Access Control (RBAC) as the primary method for managing user access to systems and applications. Under RBAC:

  • Roles: Predefined roles are established, each with a specific set of permissions and access rights aligned with typical job functions and responsibilities. 1/2 Cenareo- SAS au capital de 22175 € R.C.S Toulouse 789 137 650- APE: 6201Z TVA intra: FR 789 137 650Toulouse - Paris - Tunis - New York cenareo.com
  • User Assignment: Users are assigned roles based on their job requirements.
  • Least Privilege: Users are granted the minimum set of privileges necessary to perform their assigned duties effectively.

‍

User Access Review Frequency

  • Business Users: User access rights for business users are reviewed at least annually or upon a significant change in role or responsibilities.
  • Privileged Users: Access rights for privileged users (e.g., system administrators) are reviewed quarterly due to the higher risk associated with their elevated permissions.
  • Generic/Shared Accounts and System/Service Accounts: Access rights for generic/shared accounts and system/service accounts are reviewed semi-annually to ensure they are still necessary and used appropriately.

‍

Unauthorized Access Detection

We have implemented controls to detect unauthorized access attempts. These controls include:

  • User Activity Monitoring: User activity on critical systems is monitored for suspicious behavior.
  • Log Management:Systemlogs are collected and analyzed for unauthorized access attempts. ●
  • Access Reviews: Regular access reviews help identify discrepancies and potential misuse of access privileges.
  • Strong Password Policies: Enforcing strong password policies and multi-factor authentication helps prevent unauthorized access.

‍

Privileged Access Management

In addition to the access review processes outlined above, we implement additional controls for privileged access management including:

  • Just-In-Time (JIT) Privileged Access: Granting elevated privileges only when required for a specific task and reverting to standard user privileges after completion.
  • Session Monitoring: Monitoring privileged user sessions for suspicious activity.

Need to reach us?

Contact our teams if you have any questions on this subject.

Contact us
Cenareo

Politique de gestion des accès

Text Link
Engage your audiences,
become media.
Audiences
ShoppersEmployeesFlowMarket
SOLUTIONS
Solution Affichage dynamiqueSolution Vidéo
Company
CastingAboutContact us
Resources
BlogInsightsCase studiesVideos
CENAREO 2024, All rights reserved.
Centre d'aideSupportLégalRGPDCybersécuritéPlan du site
Cenareo - digital signage, solution video