Identity and Access Management Lifecycle

Taher A. Alwusaibie

Abstract: Identity and Access Management (IAM) plays an integral part in the overall cybersecurity posture of any enterprise. In this area, simply deploying an IAM solution will not ensure that your enterprise is following best practices in this cybersecurity pillar. Most products in the market provide many of the functionalities that businesses require. Employing these features and functions, and translating them into the right method to protect assets, is what matters the most.

This paper aims to identify the common cybersecurity practices in the area of IAM lifecycle to ensure that users and identities are managed with least privileged model in-place. The paper discusses IAM concepts that the enterprise should maintain, to secure their identity and access management, as any wrongdoing in this area can have severe impact.

Keywords: Identity and Access Management, IAM, Lifecycle Management.

Title: Identity and Access Management Lifecycle

Author: Taher A. Alwusaibie

International Journal of Computer Science and Information Technology Research

ISSN 2348-1196 (print), ISSN 2348-120X (online)

Research Publish Journals

Vol 8, Issue 3, July 2020 - September 2020

Citation
Share : Facebook Twitter Linked In

Citation
Identity and Access Management Lifecycle by Taher A. Alwusaibie