Security Compliance-driven role management:
Compliance School
Compliance-driven role management
State privacy laws, along with regulations like HIPAA and PCI DSS, have forced many organizations to create stronger controls and accountability regarding who can handle sensitive information. Learn how integrating role and entitlement management technology into the enterprise will help you deal with IAM challenges.
About the author:
Richard Mackey is vice president of consultancy SystemExperts.
-
Quiz: Compliance-driven role management
Quiz - Use this five-question quiz to test your knowledge of role and entitlement management.
-
Identity lifecycle management for security and compliance
Tip - Enterprise identities and their associated roles need to be provisioned for access to a variety of services and systems around the organization. In many cases, the entitlements provided to these various entities have a significant effect on compliance....
Security Management Strategies for the CIO