Section 17.156 Identity and Access Management (IAM) Solutions Flashcards
Objectives 2.4 Given a scenario, you must be able to analyse indicators of malicious activity. Objectives 4.6 Given a scenario, you must be able to implement and maintain identity and access management.
1
Q
Identity and Access Management (IAM)
A
Ensures right individuals have right access to right resources for right reasons
2
Q
IAM Technologies
A
Provide tools for business processes that facilitate the management of electronic identities, including…
Password management
Network access control
Digital identity management
3
Q
IAM Processes (IAAA)
Identification
A
Claiming identity, e.g., username, email address
4
Q
IAM Processes (IAAA)
Authentication
A
Verifying user, device, or system identity
5
Q
IAM Processes (IAAA)
Authorisation
A
Determining user permissions after authentication
6
Q
IAM Processes (IAAA)
Accounting/Auditing
A
Tracking and recording user activities