Cyber Security: Identity and access management
							Status: Retired
							
						
									
						
							Published: 
							11/05/2021
						
					
						
							Security level: Official
						
					
						
							Amended / Internally developed: 
							False
						
					
						
						    Live on platform: 
							23/09/2021
						
					
						
						    Retired from platform: 
							03/10/2025
						
				
							Target Audience: Technical / General
						
					
						
							Authoring body: National Cyber Security Centre (NCSC)
						
 
				
					
					
					
				    
    
				
					
					
						Grading: 
    						no grading applied
					
					
				
								Guidance
							
						
		
						Abstract
							Step 6 from the 10 steps to Cyber Security covers how to control who and what can access your systems and data via identity and access management (IAM)
Access to data, systems and services need to be protected. Understanding who or what needs access, and under what conditions, is just as important as knowing who needs to be kept out. You must choose appropriate methods to establish and prove the identity of users, devices, or systems, with enough confidence to make access control decisions. A good approach to identity and access management will make it hard for attackers to pretend they are legitimate, whilst keeping it as simple as possible for legitimate users to access what they need.
							
								Download attachments: 
							
							
									
						
					
	
		
			
			
				
					Category:
					
						
						
							
								
									Security