Identity and Access Management Overview
First, let’s take a high-level look at all the sub-functions that should be addressed as part of identity and access management. The following image captures much of what the identity and access management function entails.
Figure 6.1: Sub-functions of the identity and access management function
Today, identity can be somewhat considered as the foundation for cybersecurity within your organization. Although there are other methods of compromising data, simply gaining access to a user or administrative account can be destructive. If an intruder compromises an account, they now acquire the same account level of access across all systems and data. All this can take place without anyone being alerted. It is very important that you are rigid with your identity and access policies. The role of least privilege is a must!
This is a concept where you only receive the required access to data based on your job function. For example...