Delegated Security Administration - Hitachi ID Identity Manager
Secure identity management and access governance depends as much on business processes as it does on technology infrastructure.
- Finding and Deactivating Orphan Accounts:
Using Identity Manager to find and deactivate dormant and orphan login accounts.
- User Access Deactivation:
Prompt and reliable user access termination are essential to internal controls over enterprise IT infrastructure.
- Access Change Authorization:
Use Identity Manager to enforce robust processes to authorize changes to user access rights.
- Enforcing Security Standards:
Standards are an important way to ensure that users get just the entitlements they need, and no more. Naming standards are also important, as they help in the implementation of accountability measures, such as connecting security events on different systems back to individual users.
- Global Access Reporting:
One of the key requirements for secure identity management and access governance is the ability to find out who has access to what systems of data. This capability must span systems and platforms -- hence global access reporting.