Identity and access management
Control who and what can access your systems and data.
Access to data, systems and services needs to be protected. Understanding who or what needs access, and under what conditions, is just as important as knowing who and what needs to be kept out.
You must choose appropriate methods to establish and prove the identity of users, devices, or systems, with enough confidence to make access control decisions.