The purpose of the Identity and Access Management process is to establish and maintain a registry of IT user identities
and their associated access rights for each service. The registry provides a key reference for the authorization or
rejection by the Security Management process of service usage attempts.
See the definition of identity. The process provides the ability to control and track who has access
to data and services. It contributes to achieving the appropriate confidentiality, availability, and integrity of the
organization’s data.
See the definition of rights. This definition is narrower than those established in ISO standards
relating to security. For the purposes of this process, the user might not be directly linked to one or more persons;
it can take the form of an IT product or system for which access rights must be established and tracked, and for which
an identity is therefore established.1
1ISO/IEC 15408-1, Information technology – Security techniques – Evaluation criteria for IT security. "Part
1: Introduction and general model." Widely known as the Common Criteria.
|