Header of G+H Systems GmbH

Continuously identify security risks and irregularities in IAM systems

IAM policies can be used to control your data stock (persons, identities, etc.) and identify and eliminate risks at an early stage.

Topic

Governance, Riskmanagement and ComplianceIdentity and access management

When & Where

calendar_month

Tue, 10/22/2024, 10:30 - 10:45

location_on

Forum, Booth 7-641

Download session as iCaldownload_for_offline

Details

  • Format:

    Management lecture

Session description

Predefined IAM guidelines define the target status of certain issues and can be customised by you. It is therefore helpful if you define the threshold values yourself for when something becomes critical from your point of view. For example, how many user accounts with full access do you want to allow in a certain system or how many group memberships can a user account have? And, and, and... If such a policy is active, it continuously checks the actual status against the desired target status (i.e. against the policy) and immediately alerts you to any irregularities. This way, you can be sure that your IAM database is really clean.