Abstract:
One of the factors in successful information security management is the integration of security policies, processes, people and technologies. The deployment of identity m...Show MoreMetadata
Abstract:
One of the factors in successful information security management is the integration of security policies, processes, people and technologies. The deployment of identity management integrates these factors and provides benefits to management. This paper aims to establish the process flow for a system of identity and access management (IdM) of a multinational company in the mining sector, in order to create a unique identification to user in all corporate information systems and a standardization process for access requests after mergers and acquisitions. To achieve this, a search was conducted in literature and a case to identify the business need. Finally, the study identified and showed the principal benefits generated by new processes following the demands of SOX law.
Published in: 2013 IEEE International Conference on Industrial Engineering and Engineering Management
Date of Conference: 10-13 December 2013
Date Added to IEEE Xplore: 24 November 2014
Electronic ISBN:978-1-4799-0986-5