Security Compliance Using Externalized Authorization

Central Decision Point for Fine-grained Access Control: Entitlements Management To effectively comply with various industry regulations, businesses require integrated, cost-effective information risk management solutions that can protect data and manage entitlements over applications. This document offers guidance on conducting an organizational IT risk assessment, and provides a template for determining what type of security controls […]

Federal Mission: Security Compliance using Externalized Authorization Management (EAM)

United States federal agencies are beholden to myriad regulations and standards, some of the most notable of which are the FIPS Publication 200 and the NIST Special Publication 800-53. Both documents, in combination, “ensure that appropriate security requirements and security controls are applied to all federal information and information systems.” These documents offer guidance on […]

Proving Compliance throughout the ABAC Lifecycle

One of the benefits of Attribute Based Access Control is the ability to fine-tune compliance checks and balances in real time, and make changes to policies to meet compliance in an immediate, centralized way. What’s even more complex is proving compliance, especially when it comes to showing access control permissions in real-time. The full-circle management of […]

Enforcing ABAC Policies to Meet Legal Requirements

A Webinar with Axiomatics and IAM Analysts KuppingerCole: Take me to recording Join Axiomatics and leading analyst firm KuppingerCole to learn more about Attribute Based Access Control (ABAC). ABAC solutions provide an organization with the power to control access to protected resources via a set of policies. These policies express the increasingly complicated legal and business environments […]

Axiomatics Review Manager

Enforcing complex and changing regulations is a continuous challenge for enterprises and federal agencies; it’s a costly and time-consuming activity that requires ongoing diligence. The first part is achieving compliance – but the ongoing need is the right reporting to prove safeguards are in place. For organizations that have already adopted Attribute Based Access Control (ABAC) the challenge of regulatory […]