University Report: Managing Identity and Access of Organization

Verified

Added on  2022/11/26

|12
|2749
|111
Report
AI Summary
This report delves into the critical aspects of Identity and Access Management (IAM) within organizations. It begins by defining IAM and its importance in securing enterprise networks and resources, emphasizing its role in authenticating users and authorizing access to hardware, applications, and data. The report explores key IAM concepts, illustrating them with real-world scenarios, and highlights the benefits of IAM, such as improved regulatory compliance, reduced IT risks, and enhanced efficiency. It then details the tools and processes associated with managing identities, including Single Sign-On, Multi-factor Authentication, and cloud-based data storage, and examines the role of role-based access control. The report also addresses compliance and security management, referencing regulations like GDPR and their impact on IAM. Furthermore, it discusses the application of IAM within organizations and the challenges associated with funding IAM projects. Finally, the report evaluates various vendors providing IAM solutions, such as Azure Active Directory, IBM Security Identity and Access Assurance, and Oracle Identity Cloud Service, comparing their features and capabilities to aid in selecting the best IAM solution for an organization.
Document Page
Running head: MANAGING IDENTITY AND ACCESS OF ORGANIZATION
MANAGING IDENTITY AND ACCESS OF ORGANIZATION
Name of the Student
Name of the University
Author note
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
1MANAGING IDENTITY AND ACCESS OF ORGANIZATION
Table of Contents
Introduction: 2
Discussion: 2
Concepts of Identity and Access Management: 2
Tools And Process Associated With Managing Identities: 4
Compliance and Security management for IAM: 5
IAM in the organizations: 6
Vendors providing IAM: 6
Conclusion: 8
References: 9
Document Page
2MANAGING IDENTITY AND ACCESS OF ORGANIZATION
Introduction:
Identity and Access Management is the process that is mostly referred to the policy
and technologies guided under a framework that helps to ensure the organization on the
matter of the access to the enterprise network and the technologies of the enterprise is safe
and is available to authorized people within the enterprise. The Identity and Access
Management is also known as the Identity management. The system is mainly concerned and
is based on the department that deals with providing security to the enterprises.
The Identity and Access Management systems are not only based on identifying the
genuine and authenticity of the authorized people of the enterprise who are responsible of
using the Information Technology and their resources of the enterprise, They are also
responsible for identifying and authorizing the required hardware contents and the required
applications for the employees of the organization which they are accessible to (Hu et al.,
2015).
The aim of the report is to evaluate the concepts of the Identity and Access
Management that includes the Tools and process that are associated for managing identities.
In the prevalent scenario of the market the Identity and Access Management have resulted as
a unique and vital process for the security of the organizations. This has resulted because the
compliance that is regulatory in nature has turn out to be ascending more complex.
Discussion:
Concepts of Identity and Access Management:
Identity and access management (IAM) is a crucial system that plays an integral role
within an organization to keep the system of the organization safe. The concept of the
Identity and Access Management can be evaluated with the help of an example scenario of an
Document Page
3MANAGING IDENTITY AND ACCESS OF ORGANIZATION
organization which describes the situation of the company when it hires a new employee and
provides the worker with the Email access of the organization and also provides him with the
credentials for the login purpose. The employee is free to use the corporate email, address
which enables him to enter and log in to different categories of the system within the
organization. These include the email access to all level of authorized access of the
organization up till the database tracker which focuses on the performances of the application
of the web that has been developed for the organization (Rittinghouse & Ransome, 2017).
The login credentials belong to all kinds of the communication process within the
organization.
But after the worker leaves working in the organization, the Identity Access
Management allows the organization to gain control over the old account of the personal. The
implementation of the system process allows the management committee of the organization
to take care on the matter of the authorization and all kinds of access facilities that were
privileged to the employee in all the system of the of the organization, This process enables
the system of the organization to gain more security in very less time and less costs invested.
The system also creates scope within the organization by being more productive in the field
of Automation replacing the manual service.
The advantages of the Identity Access Management are as follows:
The regulatory compliance gets more improved in an increasing manner.
The risk on the information technology and communication field gets reduced.
The IAM reduces the Information Technology operations and the costs related to the
development.
The system helps to advance the transparency and the rate of efficiency of the
operating system of the organization (Fremantle, et sl., 2014).
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
4MANAGING IDENTITY AND ACCESS OF ORGANIZATION
The systems help to improve the consumer satisfaction level.
It provides extra cautioned security to the infrastructure of the technologies used in
the organization.
Tools And Process Associated With Managing Identities:
There are several factors why companies should install software for identity
management. Despite the difficulty of providing consumers safe access through all these
instruments, time, cost savings and improved safety can be achieved. This is why the
significance of identity management software is still highlighted. Identity management
software mainly includes four key functions: identity purity, user access, service, and
multimedia (Wang et al., 2013).
Identity management is a software tool category that enables companies of every size
to usually manage all of their employees ' identities and access rights. This was a wide-
ranging characterization; there are numerous distinct instruments under the umbrella of
identity management or identity access management. One of the key capacities of this
software is that it enables companies to create guidelines to define their user’s digital
identities in the correct conditions and in a timely manner (Habiba et al., 2014). The
enterprise can easily set access rules, both for the offices and for online platforms, if the
doors have a modern access contents.
Some of the tools are as follows:
Single sign-on: the single sign on defines the process of centralizing in matter of
logging in all of the applications that are developed by the enterprise and is related to
the business purpose of the enterprise (Nida, Dhiman & Hussain, 2014). By the Single
Sign On process, the admin executives of the business organization have the power to
regulate the access of a particular employee to any kind of enterprise related
Document Page
5MANAGING IDENTITY AND ACCESS OF ORGANIZATION
application. They also helps in setting the permissions that includes the easier process
of provision and de-provision of the employees of the enterprise.
Multi-factor authentication: The Multi-factor authentication delivers an unique and
important second layer that is responsible in the stages of the security after the setting
of the passwords (Van et al., 2016). The passwords can be shared and compromised
easily. Multi-factor authentication is based on generating one time passwords by the
applications on the phone of the employee. They also consist of the Yubikeys which
helps to give access for the login by plugging it into the machine.
Data storage on-site or in the cloud: This is one of the most vital tools for the
management of the identity. This enables the option of the outsourcing the work to a
particular provider of the identity access management for the purpose of both the
security and costing for the operations (Kumar, Raj & Jelciana, 2018). This generally
adopted by the eEnterprise that are small in size as they do not have the facility of
large server racks within their organization.
Role based access: This tool is similar in working like the Single Sign On facility. The
tools help the executives of the administration to create new permissions for the
ability to access within the Identity management software according to the level of the
employee (Hu et al., 2015).
Compliance and Security management for IAM:
There are many governments that are concerned with the identity management issue
of the organizations. There have been regulations that are responsible for the control over the
access ion the grounds of the information by the customer or the employees of the
organization. The regulations like the Sarbanes-Oxley, HIPAA, and Gramm-Leach-Bliley are
hold responsible for controlling the access (Zhang, Zhu & Ding, 2013). The Identity
Document Page
6MANAGING IDENTITY AND ACCESS OF ORGANIZATION
management systems are able to help the organizations in accordance to the specified
regulations.
The General Data Protection Regulation requires more strong kind of the security and
also the User access controls are needed to be stronger. The GDPR provides permission in
securing the organization that enables the strong security and user access controls of an
enterprises in the Europe (Furfaro, Garro & Tundis, 2014). The GDPR affects on all the
business process that are concerned and related with the European countries.
The automation of the security for the user access in the networks of the enterprises
has been secured by the identity management systems. This helps the organization to stay in
the compliance in accordance with the regulations carried out by the government (Nickel,
2016). There are many critical advantages that have been experienced due to the
implementation of the IAM, provided the enterprises are persistent enough.
IAM in the organizations:
The funding for IAM projects are challenging in few cases as they are not associated
with direct increase of profit in the organization. However, the lack of the system in an
enterprise can cause serious not only to the compliance but also to the whole security system
of the organization. This infarct becomes the issue due to mismanagement and increases the
risk for the high rate of damages done by both internal and external sources.
The administrative attention has always been gained on the security of the system as
well as the business data flow. The business nature has been evolving with the increased rate
of difficulties.
Vendors providing IAM:
Most of the enterprises prefer on purchasing the tools from the third parties claiming
the IAM Tools over developing self internal tools. The products that have been delivered
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
7MANAGING IDENTITY AND ACCESS OF ORGANIZATION
from the tool organizations can take the shape at various forms like the Identity and Service
(IDaaS) Cloud model, hybrid type of cloud model and the micro services model. The identity
and Access Management product that are delivered and applied to an enterprise by the help of
the vendors helps in controlling the access that is delivered to the networks, Data and the
applications. The departments and the executives that are responsible for the IAM lets the IT
departments get sure with the cloud and environments deliver the correct access to the correct
roles.
Some of the vendors evaluating different competing solutions are as follows:
Azure Active Directory:
The Microsoft Azure which is the cloud computing based service provider for the
enterprises carries several notable features with it which makes it competitive in the market.
The features like the Single Sign On, access request management, Multifactor authentication,
user provisioning, passwords management, access request management, role management,
privileged account management, user activity monitoring and the security monitoring and
altering process (Nickel, 2016). The markets and the use cases are Office 365, Azure and
dynamics CRM Online customers. They provide service on the Cloud platform for the
organization.
IBM Security Identity and Access Assurance:
The IBM delivers the identity and access management platform that develops by
strengthening the compliance with fewer amounts of risks by monitoring the access of the
user in various environments related to the organization (Panth, Mehta & Shelgaonkar, 2014).
The notable features Single sign-on, privileged identity management, user provisioning,
access management, log management and user reporting, multifactor authentication, role
management, password management, user activity monitoring and compliance management.
Document Page
8MANAGING IDENTITY AND ACCESS OF ORGANIZATION
Oracle Identity Cloud Service:
The transforming company which was based database production and is now capable
of delivering IT solution including security to the enterprises delivers an integrated
application to the enterprise. The notable features of the service providers are the access
request management, Single sign-on, multifactor authentication, password management, user
provisioning, role management; compliance management and security qualifications: SAML,
Open ID Connect (Li et al., 2013).
Conclusion:
It can be concluded in this report that Identity Access Management helps the
enterprises along with their employees in the IT to develop the security in the business level.
The program has created the environment that helps the enterprise to manage the personal
information and all the data of the employees and the authorized persons of the enterprise. It
checks the authenticity of the employees and validates the existing users in the enterprise and
restricts the pas employees of the company. The main goal of the IAM lays in improving the
security level of the organization that directly affects in the positive growth of the
productivity of the enterprise.
Document Page
9MANAGING IDENTITY AND ACCESS OF ORGANIZATION
References:
Fremantle, P., Aziz, B., Kopecký, J., & Scott, P. (2014, September). Federated identity and
access management for the internet of things. In 2014 International Workshop on
Secure Internet of Things (pp. 10-17). IEEE.
Furfaro, A., Garro, A., & Tundis, A. (2014, October). Towards security as a service (secaas):
On the modeling of security services for cloud computing. In 2014 International
Carnahan Conference on Security Technology (ICCST) (pp. 1-6). IEEE.
Habiba, U., Masood, R., Shibli, M. A., & Niazi, M. A. (2014). Cloud identity management
security issues & solutions: a taxonomy. Complex Adaptive Systems Modeling, 2(1),
5.
Hu, V. C., Kuhn, D. R., Ferraiolo, D. F., & Voas, J. (2015). Attribute-based access
control. Computer, 48(2), 85-88.
Hu, V. C., Kuhn, D. R., Ferraiolo, D. F., & Voas, J. (2015). Attribute-based access
control. Computer, 48(2), 85-88.
Kumar, P. R., Raj, P. H., & Jelciana, P. (2018). Exploring data security issues and solutions
in cloud computing. Procedia Computer Science, 125, 691-697.
Li, J., Li, J., Chen, X., Jia, C., & Lou, W. (2013). Identity-based encryption with outsourced
revocation in cloud computing. IEEE Transactions on computers, 64(2), 425-437.
Nickel, J. (2016). Mastering Identity and Access Management with Microsoft Azure. Packt
Publishing Ltd.
Nida, P., Dhiman, H., & Hussain, S. (2014). A survey on identity and access management in
cloud computing. Int. J. Eng. Res. Technol, 3(4).
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
10MANAGING IDENTITY AND ACCESS OF ORGANIZATION
Panth, D., Mehta, D., & Shelgaonkar, R. (2014). A survey on security mechanisms of leading
cloud service providers. International Journal of Computer Applications, 98(1), 34-
37.
Rittinghouse, J. W., & Ransome, J. F. (2017). Cloud computing: implementation,
management, and security. CRC press.
Van Goethem, T., Scheepers, W., Preuveneers, D., & Joosen, W. (2016, April).
Accelerometer-based device fingerprinting for multi-factor mobile authentication.
In International Symposium on Engineering Secure Software and Systems (pp. 106-
121). Springer, Cham.
Wang, F., Ge, B., Zhang, L., Chen, Y., Xin, Y., & Li, X. (2013). A system framework of
security management in enterprise systems. Systems Research and Behavioral
Science, 30(3), 287-299.
Zhang, J. Q., Zhu, H., & Ding, H. B. (2013). Board composition and corporate social
responsibility: An empirical investigation in the post Sarbanes-Oxley era. Journal of
business ethics, 114(3), 381-392.
Document Page
11MANAGING IDENTITY AND ACCESS OF ORGANIZATION
chevron_up_icon
1 out of 12
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]