!!! Overview
[{$pagename}] is a concept from [Identity Defined Security Alliance] which classifies various components for the [Framework].


[IDSA Integration Framework/IDSA-Integration-framework.png]

!! [Identity and Access Management]
* [Access Management|Access Control] - Provides the [authentication] and [authorization] mechanisms ([Single Sign-On], [Multi-Factor Authentication], [Graded Authentication]) ensuring appropriate security levels are enforced.
* [Identity Governance|Identity Governance and Administration] - Facilitates the management of a user’s [identity|Identification] as it pertains to [access], [authorization] and adherence to [compliance] requirements.
* [Identity Administration|Identity Management] - Enables [Self-Service] [Access Request], [Password Management], [Profile Management] and [Identity Lifecycle Management].

!! [Security Operations] ([SecOps])
* [Security Information and Event Management] ([SIEM]) - Enables bi-directional sharing of [data] for better visibility and intelligent decision making 
* [User and Entity Behavior Analytics] ([UEBA]) - Behavior-based security intelligence to detect and assess risky activity on the network and alter authentication processes in response.
* [Service Management|IT Service Management] - Provides a tracking mechanism to capture potential [security] considerations that warrant additional analysis.
* [Fraud and Risk] - Utilizes machine learning to find and prevent [fraud], as well as the ability to correlate [Security Incident]s from disparate sources and ensure [compliance] with corporate and industry [regulations].

!! [Risk Management]
* [Privileged Access Management] - Provides enhanced visibility and adaptive threat response to [attacks], with an emphasis on detecting abnormal [authentication] activity with [Privileged Identity].
* [Governance Risk Management And Compliance] ([GRC]) - Provides visibility to potential [security] risks and allows organization an enforcement mechanism to remediate issues.
* [Network Security] ([NetSec]) - Facilitates communication across private and public cloud infrastructures for the purposes of providing a single layer of application security.

!! [Data Protection]
* [Data Access Governance] ([DAG]) - The discovery and [Data Protection] of [data] across the enterprise and manages the process of how users are granted [access] to this [data]
* [Enterprise Mobility Management] ([EMM]) - Allows the registration of [Mobile Devices] to safely leverage [Single Sign-On] ([SSO]) for access to [cloud computing] and [Native applications]. In addition, the chain of [trust] associated with a registered device exposes device attributes and [compliance] rules.
* [Data Loss Prevention] ([DLP]) - Prevention of the distribution of sensitive [data] by utilizing sufficient [risk] based definitions to determine the appropriate level of [assurance].
* [Cloud Access Security Broker] ([CASB]) - Utilizes the deep analysis capabilities to provide [Adaptive Risk] analytics to identify compromised [credentials] and potential [risks] that can then be used in [authentication] decisions.

!! More Information
There might be more information for this subject on one of the following:
[{ReferringPagesPlugin before='*' after='\n' }]