1. Managing User Access Controls
    1. Managing user permissions is a critical process all organizations should be able to do quickly and effectively.
    2. Managing user access controls has become more important (and also more complex) than ever before.
  2. Two Options to Manage User Access and Permissions:
    1. Manual Identity and Access Control Management
      1. Provisioning
        1. In Identity and Access Management, providing new users with access to things they need.
      2. De-Provisioning
        1. In Identity and Access Management, removing access from users as they depart from a system.
    2. Security Orchestration and Automation
      1. Security Orchestration
        1. A method of connecting security tools and integrating disparate security systems.
        2. A security orchestration solution connects your systems, tools, and processes together, allowing you to leverage automation as necessary, and get more value out of your people, processes, and tools.
        3. Example:
          1. Many companies make use of single sign-on (SSO) solutions, which can dramatically simplify the login process while keeping users and data protected.
          2. However, not every app supports SSO — which makes for a serious security headache, especially for users with a variety of permissions across systems.
          3. Security orchestration solves for this problem in a reliable way.
          4. With security orchestration in place, SOCs can automate the addition or removal of users under different scenarios by using pre-built integrations to the apps your business uses along with a custom workflow to ensure that access is granted only to employees who need it.
      2. Security Automation
        1. The automatic handling of security operations-related tasks. It is the process of executing these tasks, such as scanning for vulnerabilities, without human intervention.
        2. Benefits:
          1. Elasticity
          2. Load Balancing
          3. "Distributive Allocation"
          4. Scalability
          5. Resiliency
          6. System Configuration Validation
          7. Reduced Risk