IAM stands for Identity and Access Management. IAM helps system administrator to regulate user privileges within a secured network. Based on the identity of the user, the system administrator can decide which organization-resource the user can access.
IAM plays a key role in securing the organization’s resources. In an organization, it is very important to keep track of privileges provided to the users.
To answer this question, let’s look into this example. An organization has several divisions and each division need a different kind of data/resources to carry out their functionality.
The member from one division should use the resources which are meant to be used by that division. If all the divisions have access to each and every piece of information, this may lead to misuse of the resources or even to a security breach which may cost the company dearly. So it is very important to manage user access to these resources properly.
In this article, we will see what these cloud resources are and how can we manage access to these resources based on user identity.