<?xml version="1.0" encoding="utf-8" standalone="yes"?><feed xmlns="http://www.w3.org/2005/Atom"><title>Access Requests on Sinetris's viewpoints</title><id>https://sinetris.info/tags/access-requests/</id><link href="https://sinetris.info/tags/access-requests/index.atom.xml" rel="self" type="application/atom+xml" hreflang="en" title="Access Requests on Sinetris's viewpoints"/><link href="https://sinetris.info/tags/access-requests/" rel="alternate" type="text/html" hreflang="en" title="Access Requests on Sinetris's viewpoints"/><link href="https://sinetris.info/tags/access-requests/index.atom.xml" rel="alternate" type="application/atom+xml" hreflang="en" title="Access Requests on Sinetris's viewpoints"/><link href="https://sinetris.info/tags/access-requests/index.rss.xml" rel="alternate" type="application/rss+xml" hreflang="en" title="Access Requests on Sinetris's viewpoints"/><subtitle>Recent content in Access Requests on Sinetris's viewpoints</subtitle><generator uri="https://github.com/sinetris/sine-die/">Sine Die theme for Hugo</generator><author><name>Duilio Ruggiero</name><email>duilio@sinetris.info</email></author><rights type="html">&amp;copy; 2023 - 2026, Duilio Ruggiero</rights><updated>2024-07-15T16:27:00Z</updated><entry><title>Access Management</title><link href="https://sinetris.info/topics/iam/iga/access-management/" rel="alternate" type="text/html" hreflang="en" title="Access Requests on Sinetris's viewpoints"/><content src="https://sinetris.info/topics/iam/iga/access-management/" type="text/html"/><published>2024-07-15T16:27:00+00:00</published><updated>2024-07-15T16:27:00Z</updated><id>https://sinetris.info/topics/iam/iga/access-management/#atom</id><summary type="html">&lt;h2 id="why-you-need-access-management"&gt;Why you need access management&lt;/h2&gt;
&lt;p&gt;Some important points are:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;It allows to properly document granted access history for auditing and security purposes&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Who had access to a specific system, what kind of access, why, at any point in time&lt;/li&gt;
&lt;li&gt;What did they access, when, and why (via integration with SIEM systems)&lt;/li&gt;
&lt;li&gt;When they are doing operations on a system, this allow to check if they are allowed&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Monitor drifting between desired state and actual state and what caused it&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Keeping track of users accesses allow to better refine them&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;Did they had granted more access than needed for their work?&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;Grant them access based on principle of least privilege&lt;/p&gt;
&lt;/blockquote&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;</summary><category term="/types/topic" label="type: topic"/><category term="/categories/iga" label="category: IGA"/><category term="/categories/security" label="category: Security"/><category term="/tags/access-requests" label="tag: Access Requests"/><category term="/tags/access-revocation" label="tag: Access Revocation"/><category term="/tags/provisioning" label="tag: Provisioning"/><category term="/tags/deprovisioning" label="tag: Deprovisioning"/></entry></feed>