Access management lifecycle: The set of processes and procedures for managing access to a system or network, from initial user authentication to ongoing monitoring and revoking of access. It is used in organizations to ensure the security of their networks and data and to prevent unauthorized access. Examples include implementing password policies, conducting regular audits of user access, and providing training on secure access practices.
Categories: CC D3: Access Controls Concepts | CCSP D5: Cloud Security Operations | CISM D3: Information Security Program | CISSP D5: Identity and Access Management (IAM) | Security+ D5: Security Program Management and Oversight | SSCP D2: Access Controls
« Back to Glossary Index