КОНФЕРЕНЦІЇ ВНТУ електронні наукові видання, 
X Сучасні проблеми інфокомунікацій, радіоелектроніки та наносистем (СПІРН-2025)

Розмір шрифта: 
AUDITING AND MONITORING ACCESS IN IAM SYSTEMS: ENSURING REGULATORY COMPLIANCE AND DETECTING ANOMALIES
Олена Костянтинівна Полонська

Остання редакція: 2025-11-04

Анотація


In the face of growing cyber threats, effective access control to corporate data is critically important. The article discusses approaches to implementing continuous monitoring and regular auditing in identity and access management systems. Particular attention is paid to the use of user behavior analysis mechanisms for rapid identification of anomalies and prompt response to potential incidents. It also suggests ways to harmonize internal information security policies with current regulatory standards, which allows significantly reducing the risks of unauthorized access and avoiding additional financial losses due to fines.


Ключові слова


термін1 security auditing; термін2 access monitoring; термін3 cybersecurity; термін4 Anomaly Detection; термін5 identity management.

Посилання


https://circleci.com/ru/topics/identity-access-management-iam/#:~:text=Управление%20идентификацией%20и%20доступом%20(IAM, access%20k%20resursam%20vnoutery%20sistemy

https://www.issp.training/post/shcho-take-keruvannya-identyfikatsiyeyu-ta-dostupom

https://www.microsoft.com/uk-ua/security/business/security-101/what-is-identity-access-management-iam

https://www.sim-networks.com/ukr/blog/gdpr-requirements-and-iso-27001-standard#:~:text=Certification%20according%20to%20ISO%2027001,number%20of%20legislative%20acts,%20in%20particular%20GDPR

https://inseinin.com.ua/tpost/6u8k0ho361-otrimannya-sertifkats-iso-27001-nformats#:~:text=What%20is%20ISO%2027001?,development%20of%20measures%20to%20minimize%20them

 


Повний текст: PDF