IAM principals
Identity management is the cornerstone of security that ensures that users are granted the appropriate access and that unauthorized users are prevented from accessing data, systems, and applications. IAM enterprise policies set rules for the following:
- Identifying users and giving them designated roles
- Recognizing the data, platforms, and other domains that IAM protects
- Defining specific security levels and access rights for systems, sensitive data, information, and places
- Overseeing the IAM system’s insertion, deletion, and change of individuals
- Overseeing the IAM system’s addition, deletion, and adjustment of access rights for roles
The following diagram depicts the flow between personal cloud-based applications and organizational services, be they public or private sector applications, that enable connectivity and interoperability between these services:
Figure 8.2 – Interoperability flow...