19. Dezember 2024
Identy and access management controls safeguard the confidentiality and integrity of systems and data by restricting users to only the rigths needed to fulfill authorized actions.
This guide, now updated to align with the Global Internal Audit Standards, helps internal auditors understand key terms and how to approach an audit engagement to ensure their organization's IAM protocols mitigate potential security risks. Internal auditors will be able to provide assurance that controls for managing access to IT resources are well designed and effectively implemented.