University Report: Identity and Access Management Analysis

Verified

Added on  2022/11/29

|7
|720
|215
Report
AI Summary
This report provides an in-depth analysis of Identity and Access Management (IAM), a crucial framework for managing digital identities within organizations. It discusses the importance of IAM in securing sensitive data and ensuring compliance with regulations like HIPAA, GDPR, and SOX. The report highlights two key IAM tools: SailPoint and RSA, detailing their functionalities and features. It also explores the value IAM adds to an organization, including automated user identity capture, privilege management, and risk reduction. Furthermore, the report examines common vendors in the IAM space, such as Microsoft Azure Active Directory and Oracle Identity Cloud Service, providing a comprehensive overview of the IAM landscape.
Document Page
Running head: IDENTITY AND ACCESS MANAGEMENT
Identity and Access Management
Name of the student:
Name of the university:
Author note:
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
1IDENTITY AND ACCESS MANAGEMENT
Table of Contents
Introduction:....................................................................................................................................2
Discussion:.......................................................................................................................................2
2 examples of tools or process:........................................................................................................2
Compliance and Security.................................................................................................................3
Common vendors with products in the IAM...................................................................................4
References:......................................................................................................................................5
Document Page
2IDENTITY AND ACCESS MANAGEMENT
Introduction:
Identity and access management is demarcated as the framework that is used in business
processes, policies as well as technologies that helps in facilitating the management of digital
identities within a business process (Hu et al., 2015). Identity and access administration helps in
offering role created access switch while letting systems administrator to regulate the admission
to networks or systems founded on the parts of individual inside the initiative.
Discussion:
For any company, it is significant to implement a proper identity and access organization
tool as they help in storing all the authorized credentials within on place. This will help the
documents from getting accesse3d and attacked by attackers without compromising the digital
identities of the information.
2 examples of tools or process:
1. SailPoint: Sailpoint is one of the pioneers in the most commonly used tool for identity and
access management offering the best management solution. It is one of the bests in the Magic
Quadrant for the Identity Supremacy and Administration. The modules that are covered under
the Sail Point tool includes-
Compliance manager
Identity Intelligence
Governance Platform
Document Page
3IDENTITY AND ACCESS MANAGEMENT
2. RSA: RSA tool is one of the safekeeping divisions of EMC that offers RSA Individuality
Management and Governance which is one of the modules that is covered independently within
this tool (Jadeja & Parmar, 2016). This module includes accessing with the management of
certification, accessing request management, governing data access and including management
of business roles.
Compliance and Security
It is important for enterprises to manage their identities efficiently. Regulations such as
HIPAA, Gramm-Leach-Bliley, and Sarbanes-Oxley etc hold most of the access controls that are
accountable for the organization while accessing computers and information of employees.
Implementing a proper Identity management system helps organizations to comply with all these
regulations. Among the most recent regulation, the GDPR requires strong security with respect
to user controls and mandates the safety of personal data along with privacy of European Union
Citizens.
Identity and Access Managements adds value to an organization:
Identity and access management can be used in order to initiate record and capture the
user identities based on the permission of access in an automated manner (Sikeridis et al., 2017).
Using Identity and access management tool helps in accessing privileges while granting the
interpretation of policy. It helps in authenticating the services while authorizing and auditing
them. A company that makes use of identity management tools have greater control on the user
access and thus helps in reducing the internal and external risks related to data breach. IAM
service tools also help companies to better comply with the regulations of the government by
allowing transparency.
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
4IDENTITY AND ACCESS MANAGEMENT
Common vendors with products in the IAM
1. Microsoft Azure Active Directory (Copeland et al., 2014)
2. RSA Secure ID Access
3. Oracle Identity Cloud Service.
Document Page
5IDENTITY AND ACCESS MANAGEMENT
References:
Copeland, M., Soh, J., Puca, A., Manning, M., & Gollob, D. (2015). Microsoft Azure. New York,
NY, USA:: Apress.
Hu, V. C., Kuhn, D. R., Ferraiolo, D. F., & Voas, J. (2015). Attribute-based access
control. Computer, 48(2), 85-88.
Jadeja, N., & Parmar, V. (2016). Implementation and mitigation of various tools for pass the
hash attack. Procedia Computer Science, 79, 755-764.
Sikeridis, D., Papapanagiotou, I., Rimal, B. P., & Devetsikiotis, M. (2017). A Comparative
taxonomy and survey of public cloud infrastructure vendors. arXiv preprint
arXiv:1710.01476.
Document Page
6IDENTITY AND ACCESS MANAGEMENT
chevron_up_icon
1 out of 7
circle_padding
hide_on_mobile
zoom_out_icon
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]