Glossary of Compliance

Compliance Glossary

Our list of curated compliance glossary offers everything you to know about compliance in one place.

Glossary » NIST » NIST Identity and Access Management (IAM) Framework

NIST Identity and Access Management (IAM) Framework

The NIST Identity and Access Management (IAM) Framework is intended to help organizations ensure that only authorized individuals have access to critical resources, reducing unlawful access and data breaches into information systems. The framework guides organizations in developing and maintaining digital identities, as well as administering effective access controls.

The NIST IAM Framework majorly deals with:

  • Authentication: Implement mechanisms that verify user identities.
  • Permission Management: Permission needs to be aligned with roles of users for the right level of access.
  • Role-Based Access Control: This framework enables robust security by defining access based on user roles.

In addition, it promotes monitoring of activities of users and events for proactive identification of suspicious behavior. It also lays emphasis on training and employee awareness about IAM policies to ensure their effective implementation and adherence.

Some other things that are included in the NIST framework include security and compliance best practices and work towards integrating with any other applicable NIST frameworks, such as the NIST Cybersecurity Framework (CSF) and the Risk Management Framework (RMF), to give a 360-degree view of risk management.

NIST conducts regular research on new and emerging threats and technologies to come out with updated standards for IAM.

Additional reading

ISO 27001 Password Policy

Implementing ISO 27001 Password Policy: Everything You Need to Know

Identity theft is not a joke, Jim. Millions of people suffer every year! Remember this dialogue from the popular TV show The Office? As compliance experts, we believe these are golden words to live by. Identity theft in a business environment ranges from wide net phishing attempts to targeted spear phishing attempts. And this is…
HIPAA compliant text messaging

How to raise HIPAA Compliant in Text Messaging

Healthcare service providers regularly access or communicate protected health information (PHI) between themselves or healthcare workers. An efficient and convenient way to communicate is through text messages. While it offers speed and accessibility, it is not always secure and susceptible to a breach incident. PHI handlers must find a way to balance convenience and security….

Sprinto: Your growth superpower

Use Sprinto to centralize security compliance management – so nothing
gets in the way of your moving up and winning big.