From the course: Building and Auditing a Cybersecurity Program

Unlock this course with a free trial

Join today to access over 25,300 courses taught by industry experts.

Access management to control unauthorized access

Access management to control unauthorized access

From the course: Building and Auditing a Cybersecurity Program

Access management to control unauthorized access

- [Instructor] Access management is a framework of policies, processes and technologies that enable an organizations to manage digital identities and control user access to an organization's information. Access management is a cornerstone in every robust cybersecurity program. Access management ensures the right individuals get access to the right resources. Access management is also referred to as identity and access management, IAM. Identity and access management consists of four core control objectives. Number one, identification. Who are you? Identifiers also called IDs may be created for people, groups and system defined processes. Identification usually consists of your name, username, ID, number, or employee number. Authentication. Can you prove your identity. Authentication factors are often defined as something you know like a password, something you have like a digital token or something you are…

Contents