Affiliation:
1. University at Buffalo, SUNY, USA
Abstract
Customer identity and access management (CAIM) is an emerging field that is a subset of traditional identity and access management. Authenticating, authorizing, and granting access to company systems to employees is the foundation of traditional IAM. Contrarily, CIAM is a specialist field that allows organizations to authenticate, authorize, and provide access to their customers/consumers for on-premises or cloud-based organizational systems. By granting customers access, it becomes necessary to control the degree of access granted to customers; as a result, auditing is a crucial component of CIAM. Auditing aids in directing businesses towards establishing control environment, assessing risk, developing, and monitoring relevant IT controls; and keeps an eye on laws that are imposed by governing authorities. The chapter begins with an introduction to audit and customer identity access management. It addresses the risks associated with CIAM, strategies for implementing security controls and the importance of implementing these controls.
Reference67 articles.
1. Health insurance portability and accountability act of 1996.;A.Act;Public Law,1996
2. ActF. C. R. (2009). Fair Credit Reporting Act. Flood Disaster Protection Act and Financial Institute.
3. Alansari, S., Paci, F., Margheri, A., & Sassone, V. (2017, June). Privacy-preserving access control in cloud federations. In 2017 IEEE 10th International Conference on Cloud Computing (CLOUD) (pp. 757-760). IEEE.
4. Andres, J. (2018, April 10). Your Gateway to a Simple, Modern and Adaptable CIAM Architecture [web log]. forgerock.com.
5. BenantarM. (2005). Access control systems: security, identity management and trust models. Springer Science & Business Media.