Find Resources & Connect with members on topics that interest you.

AI - Acquire and Implement

PO - Plan and Organize

DS - Deliver and Support

Please sign in to see your topics.

You must be logged in to join this group.

Identity Management

Welcome to the Identity Management topic!

In this topic you may collaborate with your peers by participating in discussions, adding links and documents, and starting or contributing to wikis.

ISACA members can participate by clicking on the “Join this Community” button. You must be signed into the site. Set your alerts to be notified of new discussion activity within this community. Not an ISACA member? Join now!

This Topic Has:
583 Members
2 Online
7709 Visits

Community Leader



Badge: Energizer


NEW! Activity Badges

Badges help others understand your level of community activity and your reputation as a contributor within the Knowledge Center. Learn More.

Discussions: 55 total

Must be a Topic member to contribute
View All »
Who is the best person or office to manage keys and certs? I've seen multiple offices manage different aspects because of disconnected systems (e.g. Windows admins manager ADCS, Security admins manage HSM with encryption keys, no one manages devops and em...
Kenneth687 | 5/7/2018 9:37:41 PM | COMMENTS(0)
Is any one aware of any Identity snd Access Management Controls mappings to ISO, CobIT, NIST, etc?
Ruben242 | 5/7/2018 9:29:40 PM | COMMENTS(3)
Does anyone define and distribute an enterprise CTL? I'm looking for pros and cons for managing an enterprise trust store. Specifically on a process to remove roots from the Microsoft CTL.
Kenneth687 | 4/30/2018 11:30:21 AM | COMMENTS(0)
Hello, I want to know if you use any tool for inventoring all users in a smb. The idea is to have a small database where to document all user and all accesss to the respective systems.
Enkli78 | 4/30/2018 11:27:36 AM | COMMENTS(1)
AWS announced at their San Francisco summit a new Secrets Manager. Looks interesting and a step in the right direction for AWS security. It can pretty much store any type of credential and even arbitrary text. Best Practices -
Kenneth687 | 4/10/2018 9:18:57 AM | COMMENTS(0)
Service Accounts are used by Applications for connecting from one application to another without any human intervention. Are there are any best practices being followed in the creation and maintenance of service accounts. Are there any documents or refere...
Abraham724 | 4/10/2018 9:14:40 AM | COMMENTS(2)

Documents & Publications: 14 total

Must be a Topic member to contribute
View All »
Best practices for integrating Macs with your Microsoft Active Directory environment.
Posted by Kenneth687 124 days ago
New ISACA SSH Audit Program
Posted by Kenneth687 225 days ago
A good guide on how to tailor trust stores. This one is specific to trusting U.S. Government certificates, but could be used to tailor a PKI trust store for other root CAs.
Posted by Kenneth687 421 days ago
A primer on the U.S. Government PKI.
Posted by Kenneth687 421 days ago
The Identity Management audit/assurance review will provide management with an independent assessment relating to the effectiveness of identity management and its policies, procedures and governance activities.
Posted by Kenneth687 576 days ago

Events & Online Learning: 0 total

No Results Found

Journal Articles: 7 total

Volume 6, 2017
by Dan Blum, CISSP
Digital identity has the power to propel your enterprise forward…or it can cause you to crash and burn. How you govern and manage it will make all the difference.
Volume 5, 2017
by Adeniyi Akanni, Ph. D., CISA, CRISC, ISO 27001 LA, ITIL
Using mobile devices to complete commercial transactions is a newer scientific advancement in the information and communication technology (ICT) sphere.
Volume 5, 2013
by Srikanth Thanjavur Ravindran
Effective governance along with automated role management, authentication, user profiling and integration are keys to establishing a holistic IAM solution.
Volume 6, 2011
by Harmeet Kaur, CEH
As today’s business climate demands greater efficiency, security and regulatory compliance, the need for an effective IAM process has never been more pressing.
Volume 5, 2011
by Rafael Etges, CISA, CRISC, CIPP/C, CISSP, and Anderson Ruysam, CRISC, CISSP, ITIL
What are the governance elements required to ensure the success of an IDM deployment in a complex enterprise environment? What is the bottom-line impact of having—or not having—these elements in place?
Volume 2, 2010
by S. Anantha Sayana, CISA, CISM, CIA

Wikis: 2 total

Blog Posts: 4 total

Must be a Topic member to view blog posts
Training is a lifelong pursuit of any professional. It is our toolbox to keep our skills sharp and tuned for the next challenge. I am often asked what resources are available or how to become more proficient in the identity management specialty. Consider ...
Posted By : Kenneth687 | 0 comments
Public Key Infrastructure or PKI has been around for more than twenty years and just like a twenty-year-old it may have finally found its home with device protection. When PKI first hit the scene, it was revolutionary. A way to share information without s...
Posted By : Kenneth687 | 0 comments
On March 1st,  I was invited to speak at the CampIT conference on Enterprise Risk/Security Management at Rosemont Convention Center. Before me there were two speakers. The first presenter spent an hour presenting the story from the trenches of technolog...
Posted By : appolloconsulting | 2 comments
Traditionally, each software application is developed to maintain and manage the identity and the related permission information within it. As more and more such applications gets deployed, user provisioning and managing access control could soon be a nig...
Posted By : Kannan | 0 comments