Identity and Access Management (IAM) Processes and controls Automation

Waleed A. Alamri, Abdullah K. Almadani

Abstract: unauthorized access to critical IT systems accounts for up to 34% of all cyber attacks. Cyber attacks that aim to steal user data for monetary value, blackmailing or spying require gaining unauthorized access. Failing to revoke user privileged access is equivalent in risk as such users provides an entry point for hackers. One of the controls that can be implemented to protect organization from such risk is to develop an automated IAM process. IAM systems can be developed in-house or purchased as a ready solution from vendors.

Keywords: Automated access control, unauthorized access, CyberSecurity, Risk.

Title: Identity and Access Management (IAM) Processes and controls Automation

Author: Waleed A. Alamri, Abdullah K. Almadani

International Journal of Computer Science and Information Technology Research

ISSN 2348-1196 (print), ISSN 2348-120X (online)

Vol. 10, Issue 3, July 2022 - September 2022

Page No: 5-7

Research Publish Journals

Website: www.researchpublish.com

Published Date: 07-July-2022

DOI: https://doi.org/10.5281/zenodo.6806491

Vol. 10, Issue 3, July 2022 - September 2022

Citation
Share : Facebook Twitter Linked In

Citation
Identity and Access Management (IAM) Processes and controls Automation by Waleed A. Alamri, Abdullah K. Almadani