ITIL Foundation Online Training - $47/mo Description: 14+ Hours, 200+ Practice Questions, Lifetime Access, 100% Online, Self-paced Click Here

10 Full ITIL Mock Exams for only $25/mo.Check if you are ready to take the ITIL Exam and crack it in the first attempt Click Here

Friday, March 16, 2012

Introduction to Access Management

The Information Security Management process defines the Security Requirements that need to be enforced in the Service. However, Access Management is the actual process that governs the implementation of the security policy. Here, who needs to access to what, when, where etc are decided and implemented.

The main aim is to ensure that, only the right people have access to the right resources. This is done to ensure that, unauthorized individuals do not have access to resources meant for a different purpose. For ex: would you be ok if some random stranger can walk into your office and use the computer next to you?

Prev: Relationship between Security Management & other processes

Next: Purpose of Access Management

No comments:

Post a Comment


© 2013 by All rights reserved. No part of this blog or its contents may be reproduced or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise, without prior written permission of the Author.


Popular Posts