Establish a request system for changing users’ access rights to a request by application entitlements instead of IT group lingo. Ensure that a granular review process of access rights is available.
Identity Access Management (IAM) is a critical step in the process of securing company resources, while allowing users enough access to get the job done. Accessing data is only one component of identity and access management. Once a user has access to data, what should they be able to do with it? Should a user be able to modify or delete it? Should they be able to FTP it off to another site outside the company?
According to Steve Jensen, VP/CISO of Carlson Wagonlit Travel, there are four reasons to undertake an IAM project: regulatory compliance, enhancing security, making security operations more efficient, and making it easier for business units to interact with security.
Jensen has outlined the following 10-step program to a successful IAM project.
Why All the Hype Over Net Neutrality? Learn what net neutrality is all about and why it's so important.
OffSiteDataBackup Learn more about what businesses should expect from their off-site data backup vendor.
Seven-Step Security Health Checklist See how you fare with this security health checklist.
An eWEEK Property
Copyright 2019 Quinstreet Inc. All Rights Reserved.
Advertiser Disclosure: Some of the products that appear on this site are from companies from which QuinStreet receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. QuinStreet does not include all companies or all types of products available in the marketplace.