MANAJEMEN IDENTITAS DAN AKSES DALAM KEAMANAN SISTEM INFORMASI (PENDEKATAN LITERATURE REVIEW)
Abstract
Identity and Access Management (IAM) is a crucial element in ensuring the security of information systems within an organization. This study aims to explore the concepts, techniques, and implementations of IAM in the context of information system security through a literature review approach. With identity federation systems and Single Sign-On (SSO), organizations can improve efficiency in managing user identities and access to various applications or services without the need for repeated login processes. Identity federation allows users to access services from different organizations using the same credentials, reducing administrative burdens and enhancing user experience. SSO, as a core component of IAM, enables users to access multiple applications with a single login, simplifying access management and increasing productivity. However, security challenges remain, especially concerning data leakage risks and potential attacks exploiting its vulnerabilities. Implementing security technologies such as multi-factor authentication and role-based access management can mitigate such threats. This study concludes that effective IAM is essential for the continuity and security of information systems in modern organizations.
References
[2] A. Ramadhani, “Keamanan Informasi,” Nusantara Journal of Information and Library Studies (N-JILS), vol. 1, no. 1, pp. 39–51, 2018.
[3] CISA., “‘Cybersecurity and Infrastructure Security Agency Annual Report.’”
[4] G. GDPR, “General data protection regulation,” Regulation (EU), vol. 679, 2016.
[5] Z. Niqotaini, Strategi Sistem Informasi. 2024.
[6] R. S. Sandhu and P. Samarati, “Access control: principle and practice,” IEEE communications magazine, vol. 32, no. 9, pp. 40–48, 1994.
[7] V. C. Hu, D. F. Ferraiolo, R. Chandramouli, and D. R. Kuhn, Attribute-Based Access Control. Artech House, 2017.
[8] Gartner., “Market Guide for Identity and Access Management.” 2023.
[9] Ponemon Institute., “2023 Cost of a Data Breach Report.” 2023.
[10] Kania Sustisnawinata, “Identity and Access Management: Manfaat dan Pilar Utamanya,” https://www.asdf.id/apa-itu-identity-and-access-management-iam/.
[11] Y. Prasetia, “ROLE-BASED ACCESS CONTROL (RBAC) UNTUK SISTEM OTORISASI TERPUSAT BERBASIS FLASK STUDI KASUS PT. XYZ,” 2024.
[12] Ade Gusti, “Apa Itu Cloud Security dan Mengapa Penting di Era Digital Sekarang?,” https://idwebhost.com/blog/tips-memilih-cloud-security/.
[13] M. R. R. Budianto, S. F. Kurnia, and T. R. S. W. Galih, “Perspektif Islam Terhadap Ilmu Pengetahuan dan Teknologi,” Islamika: Jurnal Ilmu-Ilmu Keislaman, vol. 21, no. 01, pp. 55–61, 2021.
[14] A. Rukmana, “PERAN TEKNOLOGI DI DUNIA ISLAM,” Mumtaz: Jurnal Studi Al-Qur’an dan Keislaman, vol. 2, pp. 111–120, Oct. 2019, doi: 10.36671/mumtaz.v2i1.21.
[15] L. A. Saputra, F. M. Akbar, F. Cahyaningtias, M. P. Ningrum, and A. Fauzi, “Ancaman Keamanan Pada Sistem Informasi Manajemen Perusahaan,” Jurnal Pendidikan Siber Nusantara, vol. 1, no. 2, pp. 58–66, 2023.

This work is licensed under a Creative Commons Attribution 4.0 International License.