Abstract: unauthorized access to critical IT systems accounts for up to 34% of all cyber attacks. Cyber attacks that aim to steal user data for monetary value, blackmailing or spying require gaining unauthorized access. Failing to revoke user privileged access is equivalent in risk as such users provides an entry point for hackers. One of the controls that can be implemented to protect organization from such risk is to develop an automated IAM process. IAM systems can be developed in-house or purchased as a ready solution from vendors.
Keywords: Automated access control, unauthorized access, CyberSecurity, Risk.
Title: Identity and Access Management (IAM) Processes and controls Automation
Author: Waleed A. Alamri, Abdullah K. Almadani
International Journal of Computer Science and Information Technology Research
ISSN 2348-1196 (print), ISSN 2348-120X (online)
Vol. 10, Issue 3, July 2022 - September 2022
Page No: 5-7
Research Publish Journals
Website: www.researchpublish.com
Published Date: 07-July-2022