Open Access iconOpen Access

ARTICLE

crossmark

Identity Governance Framework for Privileged Users

by Mansour Hammoud Alruwies1, Shailendra Mishra2,*, Mohammed Abdul Rahman AlShehri1

1 Department of Information Technology, College of Computer and Information Sciences, Majmaah University, Al-Majmaah, 11952, Saudi Arabia
2 Department of Computer Engineering, College of Computer and Information Sciences, Majmaah University, Majmaah, 11952, Saudi Arabia

* Corresponding Author: Shailendra Mishra. Email: email

Computer Systems Science and Engineering 2022, 40(3), 995-1005. https://doi.org/10.32604/csse.2022.019355

Abstract

Information technology companies have grown in size and recognized the need to protect their valuable assets. As a result, each IT application has its authentication mechanism, and an employee needs a username and password. As the number of applications increased, as a result, it became increasingly complex to manage all identities like the number of usernames and passwords of an employee. All identities had to be retrieved by users. Both the identities and the access rights associated with those identities had to be protected by an administrator. Management couldn’t even capture such access rights because they couldn’t verify things like privacy and security. Identity management can help solve this problem. The concept behind identity management is to centralize identity management and manage access identity centrally rather than multiple applications with their authentication and authorization mechanisms. In this research work, we develop governance and an identity management framework for information and technology infrastructures with privileged access management, consisting of cybersecurity policies and strategies. The results show the efficiency of the framework compared to the existing information security components. The integrated identity and access management and privileged access management enable organizations to respond to incidents and facilitate compliance. It can automate use cases that manage privileged accounts in the real world.

Keywords


Cite This Article

APA Style
Alruwies, M.H., Mishra, S., AlShehri, M.A.R. (2022). Identity governance framework for privileged users. Computer Systems Science and Engineering, 40(3), 995-1005. https://doi.org/10.32604/csse.2022.019355
Vancouver Style
Alruwies MH, Mishra S, AlShehri MAR. Identity governance framework for privileged users. Comput Syst Sci Eng. 2022;40(3):995-1005 https://doi.org/10.32604/csse.2022.019355
IEEE Style
M. H. Alruwies, S. Mishra, and M. A. R. AlShehri, “Identity Governance Framework for Privileged Users,” Comput. Syst. Sci. Eng., vol. 40, no. 3, pp. 995-1005, 2022. https://doi.org/10.32604/csse.2022.019355



cc Copyright © 2022 The Author(s). Published by Tech Science Press.
This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
  • 2277

    View

  • 1789

    Download

  • 0

    Like

Share Link