Effective Policies to Protect Information Resources: Identity Management and Organizational Access Studies X

Main Article Content

Rudolf Sinaga, Samsinar, Renny Afriany

Abstract

Information resources are an important asset for organizations, both government and private. Information resources can be data, systems, or applications used to support organizational activities. Therefore, it is important to protect information resources from various threats, such as cyberattacks, misuse, or loss. Identity and access management (IAM) is one of the efforts to protect information resources. IAM is the process of managing the identity of users and their access to information resources. Effective IAM can help organizations ensure that only authorized users can access information resources, detect and prevent unauthorized access to information resources, and facilitate user identity management. This study aims to examine effective IAM policies to protect the information resources of Organization X. The results show that an effective IAM policy must meet the following criteria: comprehensive; IAM policies should cover all aspects of identity and access management, from user identity creation to access review, risk-oriented; IAM policies should be designed to minimize risks to information resources, Flexible; IAM policies must be adaptable to the changing needs of the organization, Management support; IAM policies must be supported by the organization's management to be implemented effectively. Based on the results of this study, it is advisable to ensure that information security policies remain effective over time, so organizations should carry out regular evaluations to protect their information resources.

Article Details

How to Cite
Rudolf Sinaga, et al. (2023). Effective Policies to Protect Information Resources: Identity Management and Organizational Access Studies X. International Journal on Recent and Innovation Trends in Computing and Communication, 11(9), 2360–2369. https://doi.org/10.17762/ijritcc.v11i9.9244
Section
Articles