Systematic Review of Identity Access Management in Information Security

  • Uddin M
  • Preston D
N/ACitations
Citations of this article
112Readers
Mendeley users who have this article in their library.

Abstract

This paper is a systematic review of Identity Access Management (IAM) in information security. Identity and Access Administration (IAM) involves tools, procedures, and policies for the management of user identities and user access in an organization [1]. These users may be staff or consumers, but the objective of an IAM system is to establish a unique digital identity that can then be controlled, updated, and monitored throughout the 'access lifetime' of each user. While a person only has one digital identity, numerous accounts may be included in the identity and various access restrictions may be established by each account per resource and context. IAM needs to offer access to the appropriate resources (applications, databases, networks, etc.) in the proper context for each particular identity [1]. It showed that the IAM solution was not effectively implemented, it is an innovative field, and has attracted broader organizational interests. Data security, compliance, owing to the security breach, data loss incidents, has been investigated most. With your own (BOYD) security inside personal mobile technology, you have identified vulnerabilities and risks, vulnerability management, policies, and good practices that contribute to information security failures. It is the technology, people, and processes that should function consistently to create a safe information system.

Cite

CITATION STYLE

APA

Uddin, M., & Preston, D. (2015). Systematic Review of Identity Access Management in Information Security. Journal of Advances in Computer Networks, 3(2), 150–156. https://doi.org/10.7763/jacn.2015.v3.158

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free