Some Leading Practices in Identity and Access Management
- Details
- Published: Thursday, July 27, 2017 07:00
By Scott Smith
Security Practice Lead
Whether talking to people at large companies or small companies, when we bring up the topic of Identity and Access Management (IAM) we often hear a lot of the same comments…
- “I am concerned that we have employees who have been here 10 years, and have access to everything, but I don’t know how to control that risk.”
- “Of course we have password policies…but I’m not sure they’re being enforced.”
- “I recently discovered an account for someone who left the company 14 months ago.”
- “Half the people in our IT department have global permissions—they can access anything.”
Read more: Some Leading Practices in Identity and Access Management