top of page
  • Writer's pictureDeborah

Identity Access Management or IAM although not new is becoming increasingly a critical component of an enterprise cybersecurity program. It refers to the principles and practices of granting appropriate access to systems, network, applications and data. Put simply by the US National Institute of Standards and Technology (NIST), IAM ensures that the “right people and things have the right access to the right resources at the right time”, providing a layer of security that protects against unauthorized access.

Key concepts of IAM:

  • Authentication of an entity to check identity

  • Authorization of an entity to access specifics applications or data

Entities include an individual, a corporation, software or Internet of Things (IoT) devices.

IAM is one the tools used by organizations to mitigate cybersecurity risks and limit the risks of cyberattacks.

Recent Posts

See All

Product Corner - VAs : Quèsaco

Virtual Assets (VAs) or crypto assets refer to : “any digital representation of value that can be digitally traded, transferred or used for payment. It does not include digital representation of fiat

Upcoming Regulatory Deadlines to Watch

10 Aug 2023 - Deadline to submit comments to FCA Guidance Consultation (GC23/1) on crypto asset financial promotions. 5 Sep 2023 - Effective date of SEC Cybersecurity Risk Management, Strategy, Govern


bottom of page