Information Sharing Maturity Model
Supporting national security goals
An effective Identity and Access Management (IAM) system provides functionality for identity life cycle management and resource access control. IAM includes polices, processes, and workflows for on-boarding, off-boarding, identity modification, provisioning, authentication, authorization, and entitlement enforcement. This document will provide a visual overview of each of these steps.
To read the full document, please download the PDF attachment below.