2. Access Control Challenges

  • Various types of users need different levels of access - Internal users, contractors, outsiders, partners, etc.
  • Resources have different classification levels- Confidential, internal use only, private, public, etc.
  • Diverse identity data must be kept on different types of users - Credentials, personal data, contact information, work-related data, digital certificates, cognitive passwords, etc.
  • The corporate environment is continually changing- Business environment needs, resource access needs, employee roles, actual employees, etc.