Identity Governance and Administration

Identity Governance and Administration
Progress0/16 (0%)

Identity Governance and Administration (IGA) is how you turn identity into an auditable business process. It covers the policies, workflows, and controls that decide who should get access, who approved it, and why.

01

Access Request Management

Enable users to request access to applications and resources through self-service workflows.

02

Access Certification

Periodic review and validation of user access rights to ensure appropriateness and compliance.

03

Identity Lifecycle Management

Automate the joiner, mover, and leaver processes for identity management.

04

Role-Based Access Control

Design and implement roles to simplify access management and enforce least privilege.

05

Separation of Duties

Implement controls to prevent conflicts of interest and fraud through access segregation.

06

Provisioning and Deprovisioning

Automate the creation and removal of accounts across connected systems.

07

Entitlement Management

Discover, catalog, and manage fine-grained access rights across applications.

08

Compliance Reporting

Generate audit-ready reports demonstrating access control effectiveness.

09

Identity Analytics

Use data analytics to identify access anomalies, risks, and optimization opportunities.

10

Password Management

Implement self-service password reset and synchronization across systems.

11

CIEM (Cloud Infrastructure Entitlement Management)

Cloud Infrastructure Entitlement Management CIEM is a category of security technologies and practices designed to manage, analyze, and govern identities, access rights, and...

12

Identity Proofing

Identity Proofing is the process of verifying and validating the identities of individuals—and increasingly, non-human entities such as services and devices—to establish trust...

13

PBAC (Policy-Based Access Control)

Policy-Based Access Control PBAC is an access control model that determines and enforces access permissions based on predefined policies. These policies can be based on...

14

SCIM (System for Cross-domain Identity Management)

SCIM is an open standard protocol designed to simplify and automate identity management across different systems and domains. It provides a standardized approach for...

15

Policy as Code

Policy as Code PaC applies Infrastructure as Code principles to identity and access management, enabling organizations to define, enforce, and audit IAM policies using code...

16

AI Agent, Workload and Machine / Non-Human Identity (NHI) Management

AI Agent, Workload and Machine / Non-Human Identity NHI Management refers to the process of managing and securing the identities of non-human entities such as AI agents,...