Security Compliance-driven role management:
Compliance-driven role management
State privacy laws, along with regulations like HIPAA and PCI DSS, have forced many organizations to create stronger controls and accountability regarding who can handle sensitive information. Learn how integrating role and entitlement management technology into the enterprise will help you deal with IAM challenges.
About the author:
Richard Mackey is vice president of consultancy SystemExperts.
Quiz - Use this five-question quiz to test your knowledge of role and entitlement management.
Tip - Enterprise identities and their associated roles need to be provisioned for access to a variety of services and systems around the organization. In many cases, the entitlements provided to these various entities have a significant effect on compliance....