CISSP · Question #1024
CISSP Question #1024: Real Exam Question with Answer & Explanation
The correct answer is B: Implement identity and access management (IAM) platform.. Implementing an identity and access management (IAM) platform is the option that is most likely to resolve the issues associated with user access. IAM is a framework that defines and manages the identities and access rights of the users and entities in an organization, such as th
Question
A large organization's human resources and security teams are planning on implementing technology to eliminate manual user access reviews and improve compliance. Which of the following options is MOST likely to resolve the issues associated with user access?
Options
- AImplement a role-based access control (RBAC) system.
- BImplement identity and access management (IAM) platform.
- CImplement a Privileged Access Management (PAM) system.
- DImplement a single sign-on (SSO) platform.
Explanation
Implementing an identity and access management (IAM) platform is the option that is most likely to resolve the issues associated with user access. IAM is a framework that defines and manages the identities and access rights of the users and entities in an organization, such as the employees, contractors, customers, partners, or devices. IAM can help to eliminate manual user access reviews and improve compliance by providing features and functions such as: Identity lifecycle management, which automates the processes of creating, updating, suspending, or deleting the user accounts and credentials, based on the user roles, attributes, or events. Access management, which enforces the policies and rules for granting, revoking, or modifying the user access rights and permissions to the resources and services, based on the user roles, attributes, or events. Authentication, which verifies the identity of the users or entities that are trying to access the resources or services, using methods such as passwords, tokens, biometrics, or multifactor Authorization, which determines the level and scope of the user access rights and permissions to the resources or services, based on the user roles, attributes, or events. Auditing and reporting, which monitors and records the user access activities and events, and generates the reports and logs for analysis, review, or compliance purposes.
Topics
Community Discussion
No community discussion yet for this question.