Actions

Difference between revisions of "Identity and Access Management (IAM)"

(Created page with "'''Content Coming Soon'''")
 
m
Line 1: Line 1:
'''Content Coming Soon'''
+
Identity and access management (IAM) is a framework of policies, processes, and technologies to ensure that the right users have the appropriate access rights to technology resources. IAM framework is used to control access to critical systems, data, information, and knowledge within an organization. It is a very important security governance mechanism without which a business can suffer irreparable harm to its intellectual property and reputation.
 +
 
 +
Common systems used to implement IAM include single sign-on, two-factor authentication, and privileged access management.
 +
 
 +
 
 +
==See Also==
 +
*[[Computer Security]]
 +
 
 +
 
 +
 
 +
 
 +
 
 +
==References==
 +
<references />

Revision as of 16:49, 20 December 2022

Identity and access management (IAM) is a framework of policies, processes, and technologies to ensure that the right users have the appropriate access rights to technology resources. IAM framework is used to control access to critical systems, data, information, and knowledge within an organization. It is a very important security governance mechanism without which a business can suffer irreparable harm to its intellectual property and reputation.

Common systems used to implement IAM include single sign-on, two-factor authentication, and privileged access management.


See Also



References