#GartnerSEC: Reuse Procedures From IAM in PAM Implementations

Implementing identity and access management (IAM) can lend several procedures for the roll out of privileged access management (PAM). Speaking at the Gartner Security and Risk Management Summit in London, Alan Radford, technical director of One Identity, and a representative from a European IT service provider, who was speaking off the record, discussed the implementation of PAM at the company, which they said came after finding more developers had access to customer data “and with 500 IT admins we want to know what is going on, and who has what privilege and when and how they are using them.” The speaker said that when choosing what to implement, it is important to know whether you are going to choose IAM or PAM, as there are benefits to both “and it makes sense for you to do IAM first and procedures can then follow on PAM.” Radford asked, if someone has neither PAM or IAM, can PAM be a stand-alone technology?

Read full article on Infosecurity

 


Date:

Categorie(s):

Tag(s):