身份和访问管理:高级概念框架

Sanket Devlekar, Vidyavati Ramteke
{"title":"身份和访问管理:高级概念框架","authors":"Sanket Devlekar, Vidyavati Ramteke","doi":"10.47059/revistageintec.v11i4.2511","DOIUrl":null,"url":null,"abstract":"Information security is shifting from a traditional perimeter-based approach to an identity-based approach where the organization's boundaries are where their digital identities exist. The organization has multiple stakeholders having access to various organization resources. Systems and applications are part of organization resources that help them achieve their business goals. These systems and applications are internally or externally exposed to allow all stakeholders to have seamless access, thus making identity and access management a big challenge. Identity and Access Management (IAM) is a fundamental part of information security. It plays a critical role in keeping the organization's information security posture resilient to cyber attacks. This paper will identify various components of an IAM solution that are essential and should be considered while implementing and assessing the IAM solution and provides a high-level IAM framework that will allow information security professionals to assess the IAM security posture of an organization.","PeriodicalId":428303,"journal":{"name":"Revista Gestão Inovação e Tecnologias","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Identity and Access Management: High-level Conceptual Framework\",\"authors\":\"Sanket Devlekar, Vidyavati Ramteke\",\"doi\":\"10.47059/revistageintec.v11i4.2511\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Information security is shifting from a traditional perimeter-based approach to an identity-based approach where the organization's boundaries are where their digital identities exist. The organization has multiple stakeholders having access to various organization resources. Systems and applications are part of organization resources that help them achieve their business goals. These systems and applications are internally or externally exposed to allow all stakeholders to have seamless access, thus making identity and access management a big challenge. Identity and Access Management (IAM) is a fundamental part of information security. It plays a critical role in keeping the organization's information security posture resilient to cyber attacks. This paper will identify various components of an IAM solution that are essential and should be considered while implementing and assessing the IAM solution and provides a high-level IAM framework that will allow information security professionals to assess the IAM security posture of an organization.\",\"PeriodicalId\":428303,\"journal\":{\"name\":\"Revista Gestão Inovação e Tecnologias\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-08-24\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Revista Gestão Inovação e Tecnologias\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.47059/revistageintec.v11i4.2511\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Revista Gestão Inovação e Tecnologias","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.47059/revistageintec.v11i4.2511","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

信息安全正在从传统的基于边界的方法转变为基于身份的方法,在这种方法中,组织的边界就是其数字身份存在的地方。组织有多个涉众,他们可以访问各种组织资源。系统和应用程序是帮助他们实现业务目标的组织资源的一部分。这些系统和应用程序在内部或外部公开,以允许所有涉众进行无缝访问,从而使身份和访问管理成为一个巨大的挑战。身份和访问管理(IAM)是信息安全的基本组成部分。它在保持组织的信息安全态势抵御网络攻击方面发挥着关键作用。本文将确定在实施和评估IAM解决方案时必须考虑的IAM解决方案的各个组成部分,并提供一个高级IAM框架,使信息安全专业人员能够评估组织的IAM安全状况。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Identity and Access Management: High-level Conceptual Framework
Information security is shifting from a traditional perimeter-based approach to an identity-based approach where the organization's boundaries are where their digital identities exist. The organization has multiple stakeholders having access to various organization resources. Systems and applications are part of organization resources that help them achieve their business goals. These systems and applications are internally or externally exposed to allow all stakeholders to have seamless access, thus making identity and access management a big challenge. Identity and Access Management (IAM) is a fundamental part of information security. It plays a critical role in keeping the organization's information security posture resilient to cyber attacks. This paper will identify various components of an IAM solution that are essential and should be considered while implementing and assessing the IAM solution and provides a high-level IAM framework that will allow information security professionals to assess the IAM security posture of an organization.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Contribution of Best Practices to Promote Sustainable Urban Freight Transport Mapping Scientific and Technological Production Related to the MYC Gene From Patterns to Freefall: Exposing the Vulnerability of Human Predicament in the Times of the Pandemic Automatic Verbal Autopsy Classification Using Multinomial Logistic Regression Classifier by Using Recursive Feature Elimination Content and Requirements for the Development of Environmental Competence in Future Teachers
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1