Security
What is IAM??
에스테리즘
2018. 12. 19. 08:51
1. Definition of IAM (Identity Access Management)
: Establish security policies that your organization needs and manage user accounts and permissions automatically according to policies.
Solutions (SSO + Authority Management + Resource Management + Security Policy establishment + Provisioning)
2. Components of the IAM
Component | Explanation |
Clients | - Delivered on the Internet (Extranet) to various users including internal employees, business partners and customers |
EAM | - Authentication, Authorization |
Provisioning | - RBAC-based authorization management - Automated account management - Process definition for account management |
Workflow | - Process automation of account management - Define work procedures for creating, modifying, approving, or rejecting accounts |
Security Policy & Audit | - Integrated management of user information of all system accounts, DB, and applications - Integrated Audit for Account Management Information |
Self-Service & Delegation | - Direct management of user-visible information - Delegate administrative authority |
Legacy System | - Various period system and application such as groupware, ERP, KMS |
Monitoring | - Usage status of each system, real-time monitoring of illegal users |
3. Introduction effect of IAM
- Security Efficiency: Affects business processes that need to provide a consistent and improved security access control foundation.
- Security Effectiveness: Provision of safety based on access control and transparency
- Business agility and productivity: Flexible when business changes are needed
- Reduced costs: Automated security management to keep the computer input optimal
- Streamlining IT operations: Automation and transparency of IT resource access requests and approval processing procedures
- Strengthen IT risk management: Apply security policies and effective security controls
- Regulatory Compliance: Compliance with Sarbanes-Oxley, GLBA, etc.
[Note: Comparison of SSO, EAM, IAM]
Division | SSO | EAM | IAM |
Purpose | Single login, integrated authentication | SSO + Integrated Rights Management | EAM + Integrated account management |
Function | Single account | Access control according to security policy | Automatic account management through provisioning |
Tech | PKI, LDAP | ACL, RBAC | Workflow |
Pros | User convenience | Security Enhancement | Strengthen management efficiency |
Cons | Other than authentication, security vulnerability | User management difficulty | Complex system construction |