Back

Cyber Security: Identity and access management

Cyber Security: Identity and access management

Cyber Security: Identity and access management

Status: Live
Published: 11/05/2021
Security level: Official
Amended / Internally developed: No
Live on platform: 23/09/21
Retired on platform:
Target Audience: Technical / General
Authoring body: National Cyber Security Centre (NCSC)
Grading: no grading applied
Guidance
Abstract

Step 6 from the 10 steps to Cyber Security covers how to control who and what can access your systems and data via identity and access management (IAM)

Access to data, systems and services need to be protected. Understanding who or what needs access, and under what conditions, is just as important as knowing who needs to be kept out. You must choose appropriate methods to establish and prove the identity of users, devices, or systems, with enough confidence to make access control decisions. A good approach to identity and access management will make it hard for attackers to pretend they are legitimate, whilst keeping it as simple as possible for legitimate users to access what they need. 

Category: Security