IAM

The Need for IAM:

“A government agency researched the hard costs associated with identity administration across its Unix environment and the nearly 250,000 users that access those systems. The agency estimated that more than $45 million was spent annually on the provisioning and de-provisioning of Unix accounts and on routine administrative tasks such as password resets.”, Real-world Identity and Access Management (IAM) for Unix-based Systems, pp 2, Jason Fehrenbach

What are the top 5 challenges you have in your IAM implementations?

要查看或添加评论,请登录

BASSIL MOHAMMED的更多文章

  • Compliance Strategy & Management

    Compliance Strategy & Management

    Building effective Compliance Strategy and the establishment of Compliance Management Systems (CMS) bring great value…

  • Reflection on (CS)2AI — KPMG Control System Cyber Security Annual Report 2022

    Reflection on (CS)2AI — KPMG Control System Cyber Security Annual Report 2022

    I would like first to thank (CS)2AI and its partners for the effort, analysis and final report. Overall, the trends…

  • A Call for Internal/External Audit practices improvement- for Fraud Detection

    A Call for Internal/External Audit practices improvement- for Fraud Detection

    According to the “Report to the Nations - 2018 Global Study on Occupational Fraud & Abuse”, specifically on the “How is…

  • COBIT 5 Adoption & Recognition

    COBIT 5 Adoption & Recognition

    COBIT 5 Adoption & Recognition: In 2014, ISACA published a white paper describing the increasing adoption and…

  • IT Risk Management Code of Practice

    IT Risk Management Code of Practice

    "A Code of Practice for Effective Information Security Risk Management Using COBIT 5" is a new publication that we (Dr.…

    6 条评论
  • Clearing The Fog on COBIT 5

    Clearing The Fog on COBIT 5

    I receive several inquires on what COBIT 5 is best used for and how this framework can be customized to fit into…

    9 条评论
  • Where Should Information Security Report to?

    Where Should Information Security Report to?

    Information security governance ensures that all the structures, processes, roles and responsibilities related to…

  • IT Audit Benchmarking Survey

    IT Audit Benchmarking Survey

    ISACA recently published the annual “IT Audit Benchmarking Survey”. The survey is a global survey that covers IT Audit…

    4 条评论
  • Moments of Appreciation

    Moments of Appreciation

    My lovely 6th grade daughter is excited to participate in her school science fair competition this year. She asked me…

    1 条评论
  • SCADA Security Standards - NIST 800-82

    SCADA Security Standards - NIST 800-82

    Ref “SANS SCADA and Process Control Security Survey”, dated Feb, 2013 – the survey is very interesting and reflects the…