22 Feb Cybersecurity recommendation | 3 | When to set-up an Identity Access Management system (IAM)?
Posted at 08:51h
in Cybersecurity
When to set-up an Identity Access Management system (IAM)?
The problem:
Within my company, should everyone be able to access any kind of data included in the information system? Or should I set up an identity access management system (IAM), providing various rights to various staff members according to their position and function?
5 key recommendations you should keep in mind:
- It’s not always easy to define who should access what. However, we must insist on the importance of sanity behavior.
- Basically, you will need to use an ID and Access Management system, to manage rules and rights, and set up a trusted space where the restricted documents are stored.
- One step further, it can be convenient to set up a trusted space where some managers can share information and documents, knowing these exchanges will remain secure.
- Don’t forget: company stakeholders move! Your IAM system must be easily managed and linked to other corporate systems (HR among others).
- ID does not mean “password”. In fact, some sophisticated ID systems are passwordless.
Download and consult our Cybersecurity Guide for more recommendations: