IAM within the framework of defence in depth
IT leaders should address their internal processes to minimise their organisations’ IT security risk exposure and attack surface. This becomes ever more complex as business IT environments evolve. Leaders not only need to consider which employees and job roles require access to which IT systems, but also non-human access controls where either an internal or…