Overview[1]#

Identity and Access Management (IDAM, IAM, IdMA) is the security and business discipline that "enables the right individuals to access the right resources at the right times and for the right reasons".

Identity and Access Management combines Identity Management and Access Control.

Typically Identity and Access Management provides Digital Identity State to the Organizational Entity. Identity and Access Management answers questions about Digital Identity State.

Identity and Access Management addresses the need to ensure appropriate access to resources across increasingly heterogeneous technology environments and to meet increasingly rigorous compliance requirements.

The terms "Identity Management" (IdM) and "Identity and Access Management" are used in our discussions interchangeably in the area of Identity access management.

Identity Management Architecture includes the products, applications and platforms manage identifying and ancillary data about entities that include individuals, computer-related hardware, and software applications.

Identity and Access Management covers issues such as how users gain an Digital Identity, the protection of that identity and the technologies supporting that protection (e.g., network protocols, digital certificates, passwords, etc.).

Key survey findings#

Ponemon Institute, a privacy and information management research firm, conducted this inaugural study on identity compliance. The goal of the study was to better understand how business and government organizations are ensuring correct identity and access management (IAM) rights within their enterprises.
  • Although a majority of organizations are using Identity and Access Management (IAM) solutions today, two-thirds of them remain unable to effectively focus IAM policies and prioritize controls on the greatest areas of business risk.
  • For more than 70% of the respondents, identity compliance is ranked as important. The top identity compliance concerns include both tracking access of temporary and privileged users and ensuring privileges match the user’s job function.
  • Most organizations believe that the mission of identity compliance falls on the shoulders of four key groups
    • business/application owners
    • IT operations
    • audit/compliance groups
    • IT security Unfortunately, more than 65% of respondents feel that there is little to no collaboration among these groups further hindering chances of success.

More Information#

There might be more information for this subject on one of the following:

Add new attachment

Only authorized users are allowed to upload new attachments.
« This page (revision-11) was last changed on 01-Mar-2017 13:14 by jim