{"id":977,"date":"2021-02-16T08:00:00","date_gmt":"2021-02-16T02:30:00","guid":{"rendered":"https:\/\/www.enhisecure.com\/isecureblog\/?p=977"},"modified":"2021-02-16T19:56:03","modified_gmt":"2021-02-16T14:26:03","slug":"cobit-in-iam-projects-an-overview","status":"publish","type":"post","link":"https:\/\/www.enhisecure.com\/isecureblog\/2021\/02\/16\/cobit-in-iam-projects-an-overview\/","title":{"rendered":"COBIT in IAM Projects \u2013 An overview"},"content":{"rendered":"\n<p><a href=\"https:\/\/en.wikipedia.org\/wiki\/Information_technology\">Information technology<\/a> is expanding within the business world immensely. For the success of your business, one of the key requirements is the effective <a href=\"https:\/\/en.wikipedia.org\/wiki\/Corporate_governance_of_information_technology\">IT governance.<\/a> There are numerous <a href=\"https:\/\/en.wikipedia.org\/wiki\/Corporate_governance_of_information_technology\">frameworks<\/a> available to manage the <a href=\"https:\/\/en.wikipedia.org\/wiki\/Information_technology\">Information Technology<\/a> within an organization, and <a href=\"https:\/\/www.isaca.org\/resources\/cobit\">COBIT<\/a> is one such framework that aligns your  <a href=\"https:\/\/en.wikipedia.org\/wiki\/Technology_strategy\">IT strategies<\/a> with business strategies.  It narrowly focuses on <a href=\"https:\/\/en.wikipedia.org\/wiki\/Information_security\">security<\/a>, <a href=\"https:\/\/en.wikipedia.org\/wiki\/IT_risk\">risk<\/a>, <a href=\"https:\/\/en.wikipedia.org\/wiki\/Information_technology_management\">management<\/a> and <a href=\"https:\/\/en.wikipedia.org\/wiki\/Corporate_governance_of_information_technology\">governance<\/a>.<\/p>\n\n\n\n<p>While an organization is dealing with important projects like <a href=\"https:\/\/en.wikipedia.org\/wiki\/Identity-management_system\">Identity and Access Management<\/a>, <a href=\"https:\/\/www.isaca.org\/resources\/cobit\">COBIT<\/a> implementation ensures that we are aligning with the <a href=\"https:\/\/cio-wiki.org\/wiki\/Business_Objective\">business<\/a> &amp; IT objectives for <a href=\"https:\/\/en.wikipedia.org\/wiki\/Identity-management_system\">IAM<\/a>.<\/p>\n\n\n\n<p>In this blog we are going to put some light on the <a href=\"https:\/\/www.isaca.org\/resources\/cobit\">COBIT<\/a> framework and its implementation within the <a href=\"https:\/\/en.wikipedia.org\/wiki\/Business_process\">business processes<\/a> of an organization.<\/p>\n\n\n\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" title=\"ENH iSecure: COBIT in IAM Projects - An Overview\" width=\"640\" height=\"360\" src=\"https:\/\/www.youtube.com\/embed\/wkpmlRPmtw4?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe>\n<\/div><\/figure>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Information technology is expanding within the business world immensely. For the success of your business, one of the key requirements is the effective IT governance. There are numerous frameworks available to manage the Information Technology within an organization, and COBIT is one such framework that aligns your IT strategies with business strategies. It narrowly focuses [&hellip;]<\/p>\n","protected":false},"author":15,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[9,8,16],"tags":[124,131,127,125,126,129,128,130],"class_list":["post-977","post","type-post","status-publish","format-standard","hentry","category-cyber-security","category-identity-governance","category-technology","tag-cobit","tag-compliance","tag-iam","tag-it-governance","tag-it-management","tag-it-security","tag-it-strategies","tag-risk"],"_links":{"self":[{"href":"https:\/\/www.enhisecure.com\/isecureblog\/wp-json\/wp\/v2\/posts\/977","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.enhisecure.com\/isecureblog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.enhisecure.com\/isecureblog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.enhisecure.com\/isecureblog\/wp-json\/wp\/v2\/users\/15"}],"replies":[{"embeddable":true,"href":"https:\/\/www.enhisecure.com\/isecureblog\/wp-json\/wp\/v2\/comments?post=977"}],"version-history":[{"count":3,"href":"https:\/\/www.enhisecure.com\/isecureblog\/wp-json\/wp\/v2\/posts\/977\/revisions"}],"predecessor-version":[{"id":981,"href":"https:\/\/www.enhisecure.com\/isecureblog\/wp-json\/wp\/v2\/posts\/977\/revisions\/981"}],"wp:attachment":[{"href":"https:\/\/www.enhisecure.com\/isecureblog\/wp-json\/wp\/v2\/media?parent=977"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.enhisecure.com\/isecureblog\/wp-json\/wp\/v2\/categories?post=977"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.enhisecure.com\/isecureblog\/wp-json\/wp\/v2\/tags?post=977"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}