This page (revision-1) was last changed on 29-Nov-2024 16:16 by UnknownAuthor

Only authorized users are allowed to rename pages.

Only authorized users are allowed to delete pages.

Page revision history

Version Date Modified Size Author Changes ... Change note

Page References

Incoming links Outgoing links

Version management

Difference between version and

At line 1 added 31 lines
!!! Overview
[{$pagename}] is a concept from [Identity Defined Security Alliance] which classifies various components for the [Framework].
[IDSA Integration Framework/IDSA-Integration-framework.png]
!! [Identity and Access Management]
* [Access Management|Access Control] - Provides the [authentication] and [authorization] mechanisms ([Single Sign-On], [Multi-Factor Authentication], [Graded Authentication]) ensuring appropriate security levels are enforced.
* [Identity Governance|Identity Governance and Administration] - Facilitates the management of a user’s [identity|Identification] as it pertains to [access], [authorization] and adherence to [compliance] requirements.
* [Identity Administration|Identity Management] - Enables [Self-Service] [Access Request], [Password Management], [Profile Management] and [Identity Lifecycle Management].
!! [Security Operations] ([SecOps])
* [Security Information and Event Management] ([SIEM]) - Enables bi-directional sharing of [data] for better visibility and intelligent decision making
* [User and Entity Behavior Analytics] ([UEBA]) - Behavior-based security intelligence to detect and assess risky activity on the network and alter authentication processes in response.
* [Service Management|IT Service Management] - Provides a tracking mechanism to capture potential [security] considerations that warrant additional analysis.
* [Fraud and Risk] - Utilizes machine learning to find and prevent [fraud], as well as the ability to correlate [Security Incident]s from disparate sources and ensure [compliance] with corporate and industry [regulations].
!! [Risk Management]
* [Privileged Access Management] - Provides enhanced visibility and adaptive threat response to [attacks], with an emphasis on detecting abnormal [authentication] activity with [Privileged Identity].
* [Governance Risk Management And Compliance] ([GRC]) - Provides visibility to potential [security] risks and allows organization an enforcement mechanism to remediate issues.
* [Network Security] ([NetSec]) - Facilitates communication across private and public cloud infrastructures for the purposes of providing a single layer of application security.
!! [Data Protection]
* [Data Access Governance] ([DAG]) - The discovery and [Data Protection] of [data] across the enterprise and manages the process of how users are granted [access] to this [data]
* [Enterprise Mobility Management] ([EMM]) - Allows the registration of [Mobile Devices] to safely leverage [Single Sign-On] ([SSO]) for access to [cloud computing] and [Native applications]. In addition, the chain of [trust] associated with a registered device exposes device attributes and [compliance] rules.
* [Data Loss Prevention] ([DLP]) - Prevention of the distribution of sensitive [data] by utilizing sufficient [risk] based definitions to determine the appropriate level of [assurance].
* [Cloud Access Security Broker] ([CASB]) - Utilizes the deep analysis capabilities to provide [Adaptive Risk] analytics to identify compromised [credentials] and potential [risks] that can then be used in [authentication] decisions.
!! More Information
There might be more information for this subject on one of the following:
[{ReferringPagesPlugin before='*' after='\n' }]