Main Article Content
This paper is a systematic review of Identity Access Management (IAM) in information security. Identity and Access Administration (IAM) involves tools, procedures, and policies for the management of user identities and user access in an organization . These users may be staff or consumers, but the objective of an IAM system is to establish a unique digital identity that can then be controlled, updated, and monitored throughout the 'access lifetime' of each user. While a person only has one digital identity, numerous accounts may be included in the identity and various access restrictions may be established by each account per resource and context. IAM needs to offer access to the appropriate resources (applications, databases, networks, etc.) in the proper context for each particular identity . It showed that the IAM solution was not effectively implemented, it is an innovative field, and has attracted broader organizational interests. Data security, compliance, owing to the security breach, data loss incidents, has been investigated most. With your own (BOYD) security inside personal mobile technology, you have identified vulnerabilities and risks, vulnerability management, policies, and good practices that contribute to information security failures. It is the technology, people, and processes that should function consistently to create a safe information system.
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.