Identity Correlation - See Also

See Also

  • Sarbanes-Oxley Act(SOX)
  • Gramm-Leach-Bliley Act (GLBA)
  • Health Insurance Portability and Accountability Act(HIPAA)
  • Information Technology Audit (ITA)

Manual efforts to accomplish identity correlation require a great deal of time and people effort, and do not guarantee that the effort will be completed successfully or in a compliant fashion.

Because of this, automated identity correlation solutions have recently entered the marketplace to provide more effortless ways of handling identity correlation exercises.

Typical automated identity correlation solution functionality includes the following characteristics:

• Analysis and comparison of identities within multiple data sources
• Flexible match criteria definitions and assignments for any combination of data elements between any two data sources
• Easy connectivity either directly or indirectly to all permissible sources of data
• Out-of-the-box reports and/or summaries of data match results
• Ability to manually override matched or unmatched data combinations
• Ability to view data results on fine-grained level
• Assignment of unique identifiers to pre-approved or manually validated matched data.
• Export abilities to send verified user lists back to source systems and/or provisioning solutions
• Ability to customize data mapping techniques to refine data matches
• Role-based access controls built into the solution to regulate identity data exposures as data is loaded, analyzed, and validated by various individuals both inside and outside of the organization
• Ability to validate identity data against end-users more quickly or efficiently than through manual methodologies

Read more about this topic:  Identity Correlation

Famous quotes containing the word see:

    For the gods, though slow to see, see well, whenever a man casting aside worship turns folly.
    Sophocles (497–406/5 B.C.)