上QQ阅读APP看书,第一时间看更新
Account management
Once access is granted, the account associated with the user needs to be regularly monitored to evaluate activity logs. This is necessary to track resource usage by individual users, and also to detect malicious or erroneous activity that can impact the overall trustworthiness of the system. Account management also involves lifecycle maintenance functions such as role and group reallocation, permission updates, revocation, and deletion.
Now that we have a basic understanding of IAM principles in the cyber world, let's turn our focus to applying these mechanisms in the cyber-physical world, where the dynamics are significantly different.