Abstract: Identity and Access Management (IAM) plays an integral part in the overall cybersecurity posture of any enterprise. In this area, simply deploying an IAM solution will not ensure that your enterprise is following best practices in this cybersecurity pillar. Most products in the market provide many of the functionalities that businesses require. Employing these features and functions, and translating them into the right method to protect assets, is what matters the most.
This paper aims to identify the common cybersecurity practices in the area of IAM lifecycle to ensure that users and identities are managed with least privileged model in-place. The paper discusses IAM concepts that the enterprise should maintain, to secure their identity and access management, as any wrongdoing in this area can have severe impact.
Keywords: Identity and Access Management, IAM, Lifecycle Management.
Title: Identity and Access Management Lifecycle
Author: Taher A. Alwusaibie
International Journal of Computer Science and Information Technology Research
ISSN 2348-1196 (print), ISSN 2348-120X (online)
Research Publish Journals