Identity management for the requirements of the information security | IEEE Conference Publication | IEEE Xplore

Identity management for the requirements of the information security


Abstract:

One of the factors in successful information security management is the integration of security policies, processes, people and technologies. The deployment of identity m...Show More

Abstract:

One of the factors in successful information security management is the integration of security policies, processes, people and technologies. The deployment of identity management integrates these factors and provides benefits to management. This paper aims to establish the process flow for a system of identity and access management (IdM) of a multinational company in the mining sector, in order to create a unique identification to user in all corporate information systems and a standardization process for access requests after mergers and acquisitions. To achieve this, a search was conducted in literature and a case to identify the business need. Finally, the study identified and showed the principal benefits generated by new processes following the demands of SOX law.
Date of Conference: 10-13 December 2013
Date Added to IEEE Xplore: 24 November 2014
Electronic ISBN:978-1-4799-0986-5

ISSN Information:

Conference Location: Bangkok, Thailand

Contact IEEE to Subscribe

References

References is not available for this document.