An overview of identity and access management
An asset, such as data, is accessed through systems and applications. Similarly, access to facilities such as data centers and operational areas are facilitated through access control mechanisms. Hence, physical or logical access to assets needs to establish the identity of the person or process scripts before determining the access permission.
Observe the following illustration. Users need access to data or physical facilities. Similarly, scripts or programs need access to data for processing and execution. Essentially, one type of asset needs access to another type of asset. The overall process of facilitating and managing identities of such assets, and controlling access while ensuring information security, is termed as Identity and Access Management (IAM):
In this module you will understand the following:
- Physical and logical access to assets and security controls
- Identification and authentication
- Managing people to device interactions
- Integrating...