10-Step Identity Access Management Process Design - Slide 4

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12
Next 10-Step Identity Access Management Process Design-4 Next

Define entitlements based on business terms, then map one or more access groups to the application entitlements by leveraging documentation, comments and description fields. Combine like groups that have been applied on multiple platforms.

Identity Access Management (IAM) is a critical step in the process of securing company resources, while allowing users enough access to get the job done. Accessing data is only one component of identity and access management. Once a user has access to data, what should they be able to do with it? Should a user be able to modify or delete it? Should they be able to FTP it off to another site outside the company?

According to Steve Jensen, VP/CISO of Carlson Wagonlit Travel, there are four reasons to undertake an IAM project: regulatory compliance, enhancing security, making security operations more efficient, and making it easier for business units to interact with security.

Jensen has outlined the following 10-step program to a successful IAM project.

More Slideshows:

Why All the Hype Over Net Neutrality? Learn what net neutrality is all about and why it's so important.

OffSiteDataBackup Learn more about what businesses should expect from their off-site data backup vendor.

Seven-Step Security Health Checklist See how you fare with this security health checklist.


Related Topics : Vulnerabilities and Patches, Resellers, Broadcom, Broadband Services, Supercomputing

More Slideshows

Global33-290x195 2017 and Beyond: How Digital Innovation Will Impact the World

Digital innovation is by far the biggest influencer, changing the way we do just about everything, from shopping to communication to running a business. ...  More >>

ArriaNLG-IoTAutomation0x Internet of Things Personified: Integration and Automation

The real value that the Internet of Things brings is at the intersection of gathering data and leveraging it. ...  More >>

SAPSocialCollabSuccess0x 6 Strategies for Being Successful with Social Collaboration

Enterprise social collaboration solutions are most successful when they contribute to business value and benefits that address company goals. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.