Identity and access management (IAM)
GPTKB entity
Statements (97)
Predicate | Object |
---|---|
gptkbp:instanceOf |
security discipline
|
gptkbp:alsoKnownAs |
gptkb:IAM
|
gptkbp:component |
gptkb:privileged_access_management_(PAM)
gptkb:identity_as_a_service_(IDaaS) risk management device management biometric authentication compliance management zero trust security policy management session management identity governance directory services federated identity management identity federation password management API security identity proofing access certification context-aware access delegated administration entitlement management identity analytics identity brokering user self-service audit and reporting identity synchronization least privilege enforcement user deprovisioning identity monitoring access governance access policy enforcement access recertification access request management cloud IAM identity access analytics identity access approval identity access certification identity access delegation identity access denial identity access escalation identity access monitoring identity access recertification identity access reporting identity access request identity access restoration identity access review identity access revocation identity access suspension identity access termination identity anomaly detection identity audit identity compliance analytics identity compliance reporting identity consent management identity data protection identity deprovisioning analytics identity event management identity fraud detection identity governance analytics identity incident response identity policy analytics identity policy enforcement identity privacy management identity provisioning analytics identity reconciliation identity reporting identity risk analytics identity risk assessment identity threat detection identity threat intelligence identity user behavior analytics identity workflow automation just-in-time access |
gptkbp:enables |
compliance with regulations
auditability user lifecycle management |
gptkbp:focusesOn |
controlling user access to resources
managing digital identities |
gptkbp:goal |
protect sensitive data
ensure only authorized users access resources |
https://www.w3.org/2000/01/rdf-schema#label |
Identity and access management (IAM)
|
gptkbp:includes |
gptkb:government_agency
gptkb:multi-factor_authentication_(MFA) authentication user provisioning single sign-on (SSO) role-based access control (RBAC) |
gptkbp:relatedStandard |
gptkb:NIST_SP_800-53
gptkb:ISO/IEC_27001 |
gptkbp:relatedTo |
cybersecurity
information security |
gptkbp:usedIn |
gptkb:software_as_a_service_(SaaS)
cloud computing enterprise IT |
gptkbp:bfsParent |
gptkb:Policy-Based_Access_Control_(PBAC)
|
gptkbp:bfsLayer |
7
|