Discover the stakes of Identity Access Management in the implementation of infrastructure access security levels.
2 Lessons - 200 min
IAM (Identity Access Management) allows you to define user categories and their privileges.
IAM manages and administers a given set of user digital identities, and the privileges associated with each identity. IAM can be a single product or a combination of processes, software products, cloud services and hardware that give administrators visibility and control over the organizational data that individual users can access.
01. Introduction to MRI
Identity and Access Management is the set of components, concepts and processes that aim to consider identity and its elements as security criteria to define the legitimacy of an interaction with an information system.
The IAM thus embeds all the elements necessary to :
In summary, IAM will provide the processes necessary to:
By extension, the following areas are associated with AMI topics:
Various benefits are expected from MRI:
The benefits are directly measurable through the management of the risks associated with the identity and the chosen methodology.
The principle of least privilege
This principle stipulates that the user should only have the authorizations strictly necessary for a task. This defines a limit to the quantity of authorizations held by a user. But also to the evolution over time of these authorizations. The user acquires and loses authorizations according to the needs associated with the evolution of his tasks.
Zero Trust is a security framework that takes as a principle :
This framework is often illustrated through the opposition of the images of the fortress (perimeter defense at the drawbridge) and the airport (multiple controls and in depth reinforcing the authentication and authorization requirements).
QUIZ. IAM Introduction
03. Introduction to the course