The Role of Identity and Access Management in Achieving "Continuous Compliance"

Date Added: May 2010
Format: PDF

Security-related governmental regulations generally have many common requirements. The most common ones relate to the concept of knowing who users are, what applications and resources they are entitled to access, and what (and when) they actually have done. The most effective way to achieve this level of control is through a centralized and integrated security management platform that can control identities, access, and information usage. An integrated security management platform is essential for enabling automated compliance, which facilitates cost efficiencies and reduces the effort required to achieve and maintain compliance. Without compliance automation, the typical manual, paper-based controls will continue in force, limiting the effectiveness of internal controls and impacting an enterprise's ability to compete successfully with more nimble competitors.