c
July 18, 2022, 12:24 a.m. |

Cloud Security Alliance cloudsecurityalliance.org

This is Part 3 of our ‘What is IAM’ blog series. Written by Paul Mezzera, Ravi Erukulla, and Ramesh Gupta of the CSA IAM Working Group. As alluded to previously, IAM is a set of tools that implement a number of use cases. If broken down into access management and identity administration (and governance), there are several subcomponents that are important to understand. Access ManagementAccess management (AM) is known as the 'runtime' or 'time of access' component of IAM, where …

iam

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Team Lead, Security Operations Center, Cyber Risk

@ Kroll | United Kingdom

Cyber Security Risk Analyst

@ College Board | Remote - Virginia

Lead - IT Security Engineer

@ Bosch Group | BENGALURU, India

Project Cybersecurity Manager

@ Alstom | Bengaluru, KA, IN

Security Consultant

@ CloudSEK | Bengaluru, Karnataka, India