Compliance
Security
Efficiency
100

The EU cyber security regulation that mentions access management.

What is NIS2?

100

Systems, machines, things are all parts of this.

What is digital infrastructure?

100

Automated grant/revocation of employee entitlements, from onboarding to offboarding is a part of this.

What is Identity Lifecycle Management?

200

Granting only the minimum access needed is called this.

What is principle of least privilege?

200

The process of access authentication and authorization.

What is Access Management?

200

Process requiring credentials before granting access.

What is authentication?

300

The European Data Protection rules are known as this.

What is GDPR (General Data Protection Regulation)?

300

Managing secure access to administrative accounts is often referred to as this.

What is Privileged Access Management (PAM)?

300

Central management of access entitlements.

What is Identity and Access Management (IAM)?

400

Principle of only processing the necessary amount of personal information is known as this.

What is data minimization

400

Just-in-time entitlement is a part of this security strategy.

What is Zero trust?

400

Revoking access expensive software solutions.

What is license cost optimization

500

Term refers to the guidelines that dictate how user entitlements are assigned, maintained, and removed

What is entitlement management policies?

500

Data analytics focused on identities

What is identity analytics?

500

Periodic reviews of employee access rights more often goes by this term.

What is access reviews?