Find Resources & Connect with members on topics that interest you.

AI - Acquire and Implement

PO - Plan and Organize

DS - Deliver and Support

Please sign in to see your topics.

You must be logged in to join this group.

Identity Management

Welcome to the Identity Management topic!

In this topic you may collaborate with your peers by participating in discussions, adding links and documents, and starting or contributing to wikis.

ISACA members can participate by clicking on the “Join this Community” button. You must be signed into the site. Set your alerts to be notified of new discussion activity within this community. Not an ISACA member? Join now!

 
This Topic Has:
542 Members
0 Online
7402 Visits

Community Leader

Kenneth687

Kenneth687

Badge: Energizer

 

NEW! Activity Badges

Badges help others understand your level of community activity and your reputation as a contributor within the Knowledge Center. Learn More.

Discussions: 41 total

Must be a Topic member to contribute
View All »
Does anyone use or recommend a cloud access security broker (CASB)? I've been reading about it recently and found it interesting. It's kind of a like a security middleware that allows fine-grained access control to different cloud components. I'm looking ...
Kenneth687 | 12/5/2017 1:31:16 AM | COMMENTS(1)
Has anyone heard of Open Control or the Compliance Masonry? https://github.com/opencontrol/compliance-masonry It looks like a nice digitalization tool to build and write security documents. I was thinking of using it to maintain a PKI policy document. I t...
Kenneth687 | 10/11/2017 8:14:18 PM | COMMENTS(0)
After of a month of discussion on the Mozilla Security Development Forum (https://groups.google.com/forum/#!forum/mozilla.dev.security.policy), Chrome is the first browser to take action over Symantec questionable SSL issuance practices. The fallout could...
Kenneth687 | 5/4/2017 1:11:42 PM | COMMENTS(1)
NIST released a Small Business Guide to Information Security which is interesting has anyone seen it? http://nvlpubs.nist.gov/nistpubs/ir/2016/NIST.IR.7621r1.pdf. It is written as an interagency report which is a best practices style document. It's writte...
Kenneth687 | 3/20/2017 2:27:04 PM | COMMENTS(2)
Curious from the group, what technical skill sets are important to an identity management professional? I can't find anything specific, but two good sources popped up. The US National Institute of Standards and Technology (NIST) National Initiative for Cy...
Kenneth687 | 3/1/2017 1:57:44 PM | COMMENTS(5)
Afternoon everyone, This is a cross post from a couple different Knowledge topics. I am doing some market research on how PKI is used in different sectors and organizations as well as which products. The best I can see from public research is SSH and publ...
Kenneth687 | 3/1/2017 1:53:15 PM | COMMENTS(5)

Documents & Publications: 13 total

Must be a Topic member to contribute
View All »
New ISACA SSH Audit Program
Posted by Kenneth687 61 days ago
A good guide on how to tailor trust stores. This one is specific to trusting U.S. Government certificates, but could be used to tailor a PKI trust store for other root CAs.
Posted by Kenneth687 257 days ago
A primer on the U.S. Government PKI.
Posted by Kenneth687 257 days ago
The Identity Management audit/assurance review will provide management with an independent assessment relating to the effectiveness of identity management and its policies, procedures and governance activities.
Posted by Kenneth687 411 days ago

Events & Online Learning: 0 total

No Results Found

Journal Articles: 7 total

Volume 6, 2017
by Dan Blum, CISSP
Digital identity has the power to propel your enterprise forward…or it can cause you to crash and burn. How you govern and manage it will make all the difference.
Volume 5, 2017
by Adeniyi Akanni, Ph. D., CISA, CRISC, ISO 27001 LA, ITIL
Using mobile devices to complete commercial transactions is a newer scientific advancement in the information and communication technology (ICT) sphere.
Volume 5, 2013
by Srikanth Thanjavur Ravindran
Effective governance along with automated role management, authentication, user profiling and integration are keys to establishing a holistic IAM solution.
Volume 6, 2011
by Harmeet Kaur, CEH
As today’s business climate demands greater efficiency, security and regulatory compliance, the need for an effective IAM process has never been more pressing.
Volume 5, 2011
by Rafael Etges, CISA, CRISC, CIPP/C, CISSP, and Anderson Ruysam, CRISC, CISSP, ITIL
What are the governance elements required to ensure the success of an IDM deployment in a complex enterprise environment? What is the bottom-line impact of having—or not having—these elements in place?
Volume 2, 2010
by S. Anantha Sayana, CISA, CISM, CIA

Wikis: 2 total

Blog Posts: 3 total

Must be a Topic member to view blog posts
Public Key Infrastructure or PKI has been around for more than twenty years and just like a twenty-year-old it may have finally found its home with device protection. When PKI first hit the scene, it was revolutionary. A way to share information without s...
Posted By : Kenneth687 | 0 comments
On March 1st,  I was invited to speak at the CampIT conference on Enterprise Risk/Security Management at Rosemont Convention Center. Before me there were two speakers. The first presenter spent an hour presenting the story from the trenches of technolog...
Posted By : appolloconsulting | 2 comments
Traditionally, each software application is developed to maintain and manage the identity and the related permission information within it. As more and more such applications gets deployed, user provisioning and managing access control could soon be a nig...
Posted By : Kannan | 0 comments