What are some important components of IAM policy?
Sort by:
Sr Software Principal engineer (Gen AI and ML Security) in Hardware5 months ago
who - can access (Authentication)
what - actions are allowed in that environment (Authorization)
Audit & Reporting
Administration
I would recommend NIST CSF (Identify, Protect, Detect, and Respond) structure and develop under each piler.
As other members have mentioned below, define Identity stores and types, authentication types (NIST SP 800-63B), encryption requirements, LCM, Logging, etc.