What are some important components of IAM policy?

936 viewscircle icon2 Comments
Sort by:
Information Security Analyst5 months ago

I would recommend NIST CSF (Identify, Protect, Detect, and Respond) structure and develop under each piler.
As other members have mentioned below, define Identity stores and types, authentication types (NIST SP 800-63B), encryption requirements, LCM, Logging, etc.

Sr Software Principal engineer (Gen AI and ML Security) in Hardware5 months ago

who - can access  (Authentication) 
 what - actions are allowed in that environment (Authorization)
Audit & Reporting
Administration

Lightbulb on1

Content you might like

Provision privilege user account separate from regular user account, and expect workforce to use privilege account for elevated access70%

Provision standing privilege\elevated access on the regular user account 30%

Use Just-In-Time (JIT) provisioning to elevate privileges on demand for regular user account26%

View Results

Security Operation Center (SOC)27%

IT / Network Operation Center (NOC)46%

DevOps45%

Managed cloud services, incl. FinOps (cloud cost optimization)35%

IT & Hardaware procurement25%

View Results