Elements Logical Access
Logical Access security (IAM) exists of five elements
One-off each session
Logging and
Auditing
Logging user-
account login-
/logout and user-
activities, and
regularly
reviewing these
for irregularities
Identification
Logging on to a
system with the
person’s user-
account
Authentication
Verification of the
authenticity of the
user using this
user-account by
onefactor- or
twofactor
authentication
Authorisation
Assigning
permissions of
functionalities for
this user-account
according to the
normative
authorisation-
matrix
Elements Identity and Access Management (IAM)
Registration
Verification of
the
authenticity of
the person’s
identity and its
role and
issuing of its
user-account
continuouslyeach sessioneach session

Framework IAM

  • 1.
    Elements Logical Access LogicalAccess security (IAM) exists of five elements One-off each session Logging and Auditing Logging user- account login- /logout and user- activities, and regularly reviewing these for irregularities Identification Logging on to a system with the person’s user- account Authentication Verification of the authenticity of the user using this user-account by onefactor- or twofactor authentication Authorisation Assigning permissions of functionalities for this user-account according to the normative authorisation- matrix Elements Identity and Access Management (IAM) Registration Verification of the authenticity of the person’s identity and its role and issuing of its user-account continuouslyeach sessioneach session