{"id":38445,"date":"2024-09-09T07:01:57","date_gmt":"2024-09-09T05:01:57","guid":{"rendered":"https:\/\/www.firstattribute.com\/?p=38445"},"modified":"2024-02-22T09:17:50","modified_gmt":"2024-02-22T08:17:50","slug":"strengthen-iam-compliance","status":"publish","type":"post","link":"https:\/\/www.firstattribute.com\/en\/news\/strengthen-iam-compliance\/","title":{"rendered":"Strengthen IAM compliance"},"content":{"rendered":"<p><span class=\"--l --r sentence_highlight\">IAM compliance refers to adherence to guidelines, standards and legal requirements in the area of Identity and Access Management (IAM). <\/span><span class=\"--l sentence_highlight\">This includes ensuring that the IAM system and the associated processes comply with internal company guidelines as well as external regulations and best practices.<\/span><\/p>\n<p>IAM compliance typically involves implementing security policies, monitoring access authorizations, managing user identities and logging access activities to ensure the security and integrity of systems and data.<\/p>\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_82_1 counter-hierarchy ez-toc-counter ez-toc-custom ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Index<\/p>\n<span class=\"ez-toc-title-toggle\"><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/www.firstattribute.com\/en\/news\/strengthen-iam-compliance\/#IAM-and-Compliance\" >IAM and Compliance<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/www.firstattribute.com\/en\/news\/strengthen-iam-compliance\/#IT-compliance-concept\" >IT compliance concept<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/www.firstattribute.com\/en\/news\/strengthen-iam-compliance\/#Legal-conformity\" >Legal conformity<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/www.firstattribute.com\/en\/news\/strengthen-iam-compliance\/#Die-Vorgehensweise\" >Die Vorgehensweise<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/www.firstattribute.com\/en\/news\/strengthen-iam-compliance\/#Automate-IAM-compliance-with-the-FirstWare-IDM-Portal\" >Automate IAM compliance with the FirstWare IDM-Portal<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/www.firstattribute.com\/en\/news\/strengthen-iam-compliance\/#About-FirstAttribute-AG\" >About FirstAttribute AG<\/a><\/li><\/ul><\/nav><\/div>\n<h2><span class=\"ez-toc-section\" id=\"IAM-and-Compliance\"><\/span>IAM and Compliance<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><span class=\"--l --r sentence_highlight\">Identity management allows you to manage your users and authorizations within your IT landscape. <\/span><span class=\"--l --r sentence_highlight\">Particularly if you operate an identity management system in which key users and users from the specialist departments are responsible for authorization management rather than a higher-level IT administration, preparatory work is required. <\/span><span class=\"--l --r sentence_highlight\">Although all guidelines and requirements can be implemented using a suitable software solution, all guidelines and authorizations must be systematically recorded and written down in an IT compliance concept before the technical solution is implemented in order to guarantee correct implementation.<\/span><\/p>\n<h2><span class=\"ez-toc-section\" id=\"IT-compliance-concept\"><\/span><span class=\"--l --r sentence_highlight\">IT compliance concept<\/span><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>IT compliance, as part of your IT governance, helps you to structure all data processing and define legally compliant guidelines. Some essential building blocks allow you to systematically set up IT compliance for your organization and answer important questions in your organization:<\/p>\n<ul>\n<li><span class=\"--l sentence_highlight\">What data is available?<\/span><span class=\"--r sentence_highlight\"><br \/>\n<\/span><\/li>\n<li><span class=\"--l sentence_highlight\">Which data is relevant to data protection?<\/span><span class=\"--r sentence_highlight\"><br \/>\n<\/span><\/li>\n<li><span class=\"--l sentence_highlight\">Which data must be retained?<\/span><span class=\"--r sentence_highlight\"><br \/>\n<\/span><\/li>\n<li><span class=\"--l sentence_highlight\">Where are specific types of data stored?<\/span><span class=\"--r sentence_highlight\"><br \/>\n<\/span><\/li>\n<li><span class=\"--l sentence_highlight\">Who may have access to the data types or data containers?<\/span><span class=\"--r sentence_highlight\"><br \/>\n<\/span><\/li>\n<li><span class=\"--l sentence_highlight\">Who may authorize access to the data?<\/span><span class=\"--r sentence_highlight\"><br \/>\n<\/span><\/li>\n<li><span class=\"--l sentence_highlight\">How is data protected?<\/span><span class=\"--r sentence_highlight\"><br \/>\n<\/span><\/li>\n<li><span class=\"--l sentence_highlight\">What is the purpose of the data?<\/span><span class=\"--r sentence_highlight\"><br \/>\n<\/span><\/li>\n<li><span class=\"--l sentence_highlight\">What security settings are required for the devices and software solutions?<\/span><span class=\"--r sentence_highlight\"><br \/>\n<\/span><\/li>\n<li><span class=\"--l sentence_highlight\">How is the handling of data, passwords and computers by users regulated?<\/span><span class=\"--r sentence_highlight\"><br \/>\n<\/span><\/li>\n<li><span class=\"--l sentence_highlight\">What behavior is expected from users when handling data, suspected attacks and data leaks, data access and data security?<\/span><span class=\"--r sentence_highlight\"><br \/>\n<\/span><\/li>\n<li><span class=\"--l sentence_highlight\">Which processes access data and how is it processed?<\/span><span class=\"--r sentence_highlight\"><br \/>\n<\/span><\/li>\n<li><span class=\"--l sentence_highlight\">Which data must be deleted or anonymized and when due to data protection?<\/span><span class=\"--r sentence_highlight\"><br \/>\n<\/span><\/li>\n<li><span class=\" --l --r alignedSentenceHighlight-module--alignedSentenceHighlight--5ZnPy alignedSentenceHighlight-module--partialHighlightAnimationWeb--Mk8cZ bg-[#E1F0F5] text-[#25282D] sentence_highlight\">Who ensures these processes and how can some of these tasks be automated?<\/span><\/li>\n<\/ul>\n<h2><span class=\"ez-toc-section\" id=\"Legal-conformity\"><\/span><span class=\"--l sentence_highlight\">Legal conformity<\/span><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><span class=\"--l --r sentence_highlight\">The development of IT compliance concepts in your company ensures that all processes and data processing procedures can be handled in compliance with the law. <\/span><span class=\"--l --r sentence_highlight\">IT compliance provides you with measures that you can monitor and respond to. <\/span><span class=\"--l --r sentence_highlight\">It also defines requirements for contracts with customers and suppliers and the code of conduct of employees with regard to sensitive data.<\/span><\/p>\n<p>Once you have developed the concepts for your organization, the guidelines and measures can be controlled, monitored and implemented with the help of suitable identity management tools, monitoring and automation tools.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Die-Vorgehensweise\"><\/span>Die Vorgehensweise<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><span class=\"--l sentence_highlight\">How do you go about implementing legally compliant data processing?<\/span><span class=\"--r sentence_highlight\"><br \/>\n<\/span><\/p>\n<ol>\n<li><span class=\"--l sentence_highlight\">Define all requirements and guidelines in your IT compliance concepts.<\/span><span class=\"--r sentence_highlight\"><br \/>\n<\/span><\/li>\n<li><span class=\"--l sentence_highlight\">Ensure implementation using software solutions such as <a title=\"https:\/\/www.firstware.com\/de\/\" href=\"https:\/\/www.firstware.com\/de\/\" rel=\"noopener noreferrer nofollow\">IDM portals<\/a> and user instructions.<\/span><span class=\"--r sentence_highlight\"><br \/>\n<\/span><\/li>\n<li><span class=\"--l sentence_highlight\">Set up monitoring and controlling mechanisms.<\/span><span class=\"--r sentence_highlight\"><br \/>\n<\/span><\/li>\n<li><span class=\"--l --r sentence_highlight\">Finally, you should implement a review and improvement process so that you can react quickly to any changes in legislation and new requirements.<\/span><\/li>\n<\/ol>\n<h2><span class=\"ez-toc-section\" id=\"Automate-IAM-compliance-with-the-FirstWare-IDM-Portal\"><\/span><span class=\"--l sentence_highlight\">Automate IAM compliance with the FirstWare IDM-Portal<\/span><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><span class=\"--l sentence_highlight\"><a href=\"https:\/\/www.firstattribute.com\/wp-content\/uploads\/2021\/01\/IDM-Portal-512.png\" data-rel=\"lightbox-image-0\" data-rl_title=\"\" data-rl_caption=\"\" title=\"\"><img decoding=\"async\" class=\"wp-image-19833 alignleft\" src=\"https:\/\/www.firstattribute.com\/wp-content\/uploads\/2021\/01\/IDM-Portal-512-300x300.png\" alt=\"IDM-Portal Logo\" width=\"124\" height=\"124\" srcset=\"https:\/\/www.firstattribute.com\/wp-content\/uploads\/2021\/01\/IDM-Portal-512-300x300.png 300w, https:\/\/www.firstattribute.com\/wp-content\/uploads\/2021\/01\/IDM-Portal-512-150x150.png 150w, https:\/\/www.firstattribute.com\/wp-content\/uploads\/2021\/01\/IDM-Portal-512.png 512w\" sizes=\"(max-width: 124px) 100vw, 124px\" \/><\/a>IAM compliance through the FirstWare IDM-Portal ensures conformity with company guidelines.<br \/>\n<\/span><\/p>\n<p><span class=\"--l --r sentence_highlight\">Information security is ensured at various levels. <\/span><span class=\"--l sentence_highlight\">Access control is provided through role management, while permissions are controlled based on policies, timeframes and approval procedures.<\/span><\/p>\n<p><span class=\"--l --r sentence_highlight\">The IDM-Portal offers many automation options to strengthen your IAM compliance. <\/span><span class=\"--l --r sentence_highlight\">Ensure that employees receive the appropriate IT permissions from the outset. <\/span><span class=\"--l --r sentence_highlight\">New hires are automatically assigned permissions based on the user&#8217;s department, job and role in the organization. <\/span><span class=\"--l --r sentence_highlight\">Changes in position lead to automated and transparent adjustments.<\/span><\/p>\n<p><img decoding=\"async\" class=\"wp-image-38450 aligncenter\" title=\"IAM Compliance automation\" src=\"https:\/\/www.firstattribute.com\/wp-content\/uploads\/2024\/09\/Strengthen-IAM-Compliance-.png\" alt=\"IAM Compliance automation\" width=\"430\" height=\"306\" srcset=\"https:\/\/www.firstattribute.com\/wp-content\/uploads\/2024\/09\/Strengthen-IAM-Compliance-.png 1742w, https:\/\/www.firstattribute.com\/wp-content\/uploads\/2024\/09\/Strengthen-IAM-Compliance--300x213.png 300w, https:\/\/www.firstattribute.com\/wp-content\/uploads\/2024\/09\/Strengthen-IAM-Compliance--1024x728.png 1024w, https:\/\/www.firstattribute.com\/wp-content\/uploads\/2024\/09\/Strengthen-IAM-Compliance--768x546.png 768w, https:\/\/www.firstattribute.com\/wp-content\/uploads\/2024\/09\/Strengthen-IAM-Compliance--1536x1092.png 1536w\" sizes=\"(max-width: 430px) 100vw, 430px\" \/><\/p>\n<p>&nbsp;<\/p>\n<p>An authorization concept in accordance with company guidelines can be based, for example, on location, area and department, job title, management level and specialist function.<\/p>\n<p><a href=\"https:\/\/www.firstware.com\/en\/compliance\/\" target=\"_blank\" rel=\"noopener\"><button class=\"ButtonBeratung2 aligncenter\" spellcheck=\"false\" data-lt-tmp-id=\"lt-795097\" data-gramm=\"false\">IAM Compliance with IDM-Portal<\/button><\/a><\/p>\n<h2><span class=\"ez-toc-section\" id=\"About-FirstAttribute-AG\"><\/span>About FirstAttribute AG<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>FirstAttribute AG is an independent German cloud service and software company with a focus on Identity &amp; Access Management (IAM) for AD and M365\/Entra ID.<\/p>\n<p>Find out everything you need to know about our software solutions and services\u00a0<a href=\"https:\/\/www.firstattribute.com\/en\/\" target=\"_blank\" rel=\"noopener\">here<\/a>. Contact us if you want to update and accelerate your identity and authorization management and are looking for a customized IAM solution in a hybrid IT world.<\/p>\n<p><a href=\"https:\/\/www.firstattribute.com\/en\/company\/contact\/\" target=\"_blank\" rel=\"noopener\"><button class=\"ButtonBeratung aligncenter\">Contact us now<\/button><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>IAM compliance refers to adherence to guidelines, standards and legal requirements in the area of Identity and Access Management (IAM). [&hellip;]<\/p>\n","protected":false},"author":19,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[3234,3229,3233],"tags":[],"class_list":["post-38445","post","type-post","status-publish","format-standard","hentry","category-concepts","category-idm-portal-en","category-news"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Strengthen IAM compliance - FirstAttribute<\/title>\n<meta name=\"description\" content=\"What is IAM compliance? | How can IDM-Portal help? | Procedure for an IT concept and legally compliant data processing.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.firstattribute.com\/en\/news\/strengthen-iam-compliance\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Strengthen IAM compliance - FirstAttribute\" \/>\n<meta property=\"og:description\" content=\"What is IAM compliance? | How can IDM-Portal help? | Procedure for an IT concept and legally compliant data processing.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.firstattribute.com\/en\/news\/strengthen-iam-compliance\/\" \/>\n<meta property=\"og:site_name\" content=\"FirstAttribute\" \/>\n<meta property=\"article:published_time\" content=\"2024-09-09T05:01:57+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.firstattribute.com\/wp-content\/uploads\/2021\/01\/IDM-Portal-512.png\" \/>\n\t<meta property=\"og:image:width\" content=\"512\" \/>\n\t<meta property=\"og:image:height\" content=\"512\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Elysabeth Yven\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Elysabeth Yven\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.firstattribute.com\/en\/news\/strengthen-iam-compliance\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.firstattribute.com\/en\/news\/strengthen-iam-compliance\/\"},\"author\":{\"name\":\"Elysabeth Yven\",\"@id\":\"https:\/\/www.firstattribute.com\/en\/#\/schema\/person\/1b5e92b4f7766f4a48516d774a104ba1\"},\"headline\":\"Strengthen IAM compliance\",\"datePublished\":\"2024-09-09T05:01:57+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.firstattribute.com\/en\/news\/strengthen-iam-compliance\/\"},\"wordCount\":690,\"publisher\":{\"@id\":\"https:\/\/www.firstattribute.com\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.firstattribute.com\/en\/news\/strengthen-iam-compliance\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.firstattribute.com\/wp-content\/uploads\/2021\/01\/IDM-Portal-512-300x300.png\",\"articleSection\":[\"Concepts\",\"IDM-Portal\",\"News\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.firstattribute.com\/en\/news\/strengthen-iam-compliance\/\",\"url\":\"https:\/\/www.firstattribute.com\/en\/news\/strengthen-iam-compliance\/\",\"name\":\"Strengthen IAM compliance - FirstAttribute\",\"isPartOf\":{\"@id\":\"https:\/\/www.firstattribute.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.firstattribute.com\/en\/news\/strengthen-iam-compliance\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.firstattribute.com\/en\/news\/strengthen-iam-compliance\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.firstattribute.com\/wp-content\/uploads\/2021\/01\/IDM-Portal-512-300x300.png\",\"datePublished\":\"2024-09-09T05:01:57+00:00\",\"description\":\"What is IAM compliance? | How can IDM-Portal help? | Procedure for an IT concept and legally compliant data processing.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.firstattribute.com\/en\/news\/strengthen-iam-compliance\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.firstattribute.com\/en\/news\/strengthen-iam-compliance\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.firstattribute.com\/en\/news\/strengthen-iam-compliance\/#primaryimage\",\"url\":\"https:\/\/www.firstattribute.com\/wp-content\/uploads\/2021\/01\/IDM-Portal-512-300x300.png\",\"contentUrl\":\"https:\/\/www.firstattribute.com\/wp-content\/uploads\/2021\/01\/IDM-Portal-512-300x300.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.firstattribute.com\/en\/news\/strengthen-iam-compliance\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\/\/www.firstattribute.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Strengthen IAM compliance\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.firstattribute.com\/en\/#website\",\"url\":\"https:\/\/www.firstattribute.com\/en\/\",\"name\":\"FirstAttribute AG\",\"description\":\"Identity Access Management, Active Directory Spezialisten\",\"publisher\":{\"@id\":\"https:\/\/www.firstattribute.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.firstattribute.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.firstattribute.com\/en\/#organization\",\"name\":\"FirstAttribute AG\",\"url\":\"https:\/\/www.firstattribute.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.firstattribute.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.firstattribute.com\/wp-content\/uploads\/2021\/01\/FIRSTATTRIBUTE-Logo2013-final-700x145px.png\",\"contentUrl\":\"https:\/\/www.firstattribute.com\/wp-content\/uploads\/2021\/01\/FIRSTATTRIBUTE-Logo2013-final-700x145px.png\",\"width\":700,\"height\":145,\"caption\":\"FirstAttribute AG\"},\"image\":{\"@id\":\"https:\/\/www.firstattribute.com\/en\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.firstattribute.com\/en\/#\/schema\/person\/1b5e92b4f7766f4a48516d774a104ba1\",\"name\":\"Elysabeth Yven\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Strengthen IAM compliance - FirstAttribute","description":"What is IAM compliance? | How can IDM-Portal help? | Procedure for an IT concept and legally compliant data processing.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.firstattribute.com\/en\/news\/strengthen-iam-compliance\/","og_locale":"en_US","og_type":"article","og_title":"Strengthen IAM compliance - FirstAttribute","og_description":"What is IAM compliance? | How can IDM-Portal help? | Procedure for an IT concept and legally compliant data processing.","og_url":"https:\/\/www.firstattribute.com\/en\/news\/strengthen-iam-compliance\/","og_site_name":"FirstAttribute","article_published_time":"2024-09-09T05:01:57+00:00","og_image":[{"width":512,"height":512,"url":"https:\/\/www.firstattribute.com\/wp-content\/uploads\/2021\/01\/IDM-Portal-512.png","type":"image\/png"}],"author":"Elysabeth Yven","twitter_misc":{"Written by":"Elysabeth Yven","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.firstattribute.com\/en\/news\/strengthen-iam-compliance\/#article","isPartOf":{"@id":"https:\/\/www.firstattribute.com\/en\/news\/strengthen-iam-compliance\/"},"author":{"name":"Elysabeth Yven","@id":"https:\/\/www.firstattribute.com\/en\/#\/schema\/person\/1b5e92b4f7766f4a48516d774a104ba1"},"headline":"Strengthen IAM compliance","datePublished":"2024-09-09T05:01:57+00:00","mainEntityOfPage":{"@id":"https:\/\/www.firstattribute.com\/en\/news\/strengthen-iam-compliance\/"},"wordCount":690,"publisher":{"@id":"https:\/\/www.firstattribute.com\/en\/#organization"},"image":{"@id":"https:\/\/www.firstattribute.com\/en\/news\/strengthen-iam-compliance\/#primaryimage"},"thumbnailUrl":"https:\/\/www.firstattribute.com\/wp-content\/uploads\/2021\/01\/IDM-Portal-512-300x300.png","articleSection":["Concepts","IDM-Portal","News"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.firstattribute.com\/en\/news\/strengthen-iam-compliance\/","url":"https:\/\/www.firstattribute.com\/en\/news\/strengthen-iam-compliance\/","name":"Strengthen IAM compliance - FirstAttribute","isPartOf":{"@id":"https:\/\/www.firstattribute.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.firstattribute.com\/en\/news\/strengthen-iam-compliance\/#primaryimage"},"image":{"@id":"https:\/\/www.firstattribute.com\/en\/news\/strengthen-iam-compliance\/#primaryimage"},"thumbnailUrl":"https:\/\/www.firstattribute.com\/wp-content\/uploads\/2021\/01\/IDM-Portal-512-300x300.png","datePublished":"2024-09-09T05:01:57+00:00","description":"What is IAM compliance? | How can IDM-Portal help? | Procedure for an IT concept and legally compliant data processing.","breadcrumb":{"@id":"https:\/\/www.firstattribute.com\/en\/news\/strengthen-iam-compliance\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.firstattribute.com\/en\/news\/strengthen-iam-compliance\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.firstattribute.com\/en\/news\/strengthen-iam-compliance\/#primaryimage","url":"https:\/\/www.firstattribute.com\/wp-content\/uploads\/2021\/01\/IDM-Portal-512-300x300.png","contentUrl":"https:\/\/www.firstattribute.com\/wp-content\/uploads\/2021\/01\/IDM-Portal-512-300x300.png"},{"@type":"BreadcrumbList","@id":"https:\/\/www.firstattribute.com\/en\/news\/strengthen-iam-compliance\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/www.firstattribute.com\/en\/"},{"@type":"ListItem","position":2,"name":"Strengthen IAM compliance"}]},{"@type":"WebSite","@id":"https:\/\/www.firstattribute.com\/en\/#website","url":"https:\/\/www.firstattribute.com\/en\/","name":"FirstAttribute AG","description":"Identity Access Management, Active Directory Spezialisten","publisher":{"@id":"https:\/\/www.firstattribute.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.firstattribute.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.firstattribute.com\/en\/#organization","name":"FirstAttribute AG","url":"https:\/\/www.firstattribute.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.firstattribute.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.firstattribute.com\/wp-content\/uploads\/2021\/01\/FIRSTATTRIBUTE-Logo2013-final-700x145px.png","contentUrl":"https:\/\/www.firstattribute.com\/wp-content\/uploads\/2021\/01\/FIRSTATTRIBUTE-Logo2013-final-700x145px.png","width":700,"height":145,"caption":"FirstAttribute AG"},"image":{"@id":"https:\/\/www.firstattribute.com\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.firstattribute.com\/en\/#\/schema\/person\/1b5e92b4f7766f4a48516d774a104ba1","name":"Elysabeth Yven"}]}},"_links":{"self":[{"href":"https:\/\/www.firstattribute.com\/en\/wp-json\/wp\/v2\/posts\/38445","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.firstattribute.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.firstattribute.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.firstattribute.com\/en\/wp-json\/wp\/v2\/users\/19"}],"replies":[{"embeddable":true,"href":"https:\/\/www.firstattribute.com\/en\/wp-json\/wp\/v2\/comments?post=38445"}],"version-history":[{"count":4,"href":"https:\/\/www.firstattribute.com\/en\/wp-json\/wp\/v2\/posts\/38445\/revisions"}],"predecessor-version":[{"id":38454,"href":"https:\/\/www.firstattribute.com\/en\/wp-json\/wp\/v2\/posts\/38445\/revisions\/38454"}],"wp:attachment":[{"href":"https:\/\/www.firstattribute.com\/en\/wp-json\/wp\/v2\/media?parent=38445"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.firstattribute.com\/en\/wp-json\/wp\/v2\/categories?post=38445"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.firstattribute.com\/en\/wp-json\/wp\/v2\/tags?post=38445"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}