MANAJEMEN IDENTITAS DAN AKSES DALAM KEAMANAN SISTEM INFORMASI (PENDEKATAN LITERATURE REVIEW)

  • Cut Asiana Gemawaty Universitas Gunadarma
  • Yuce Yuliani Universitas Gunadarma

Abstract

Identity and Access Management (IAM) is a crucial element in ensuring the security of information systems within an organization. This study aims to explore the concepts, techniques, and implementations of IAM in the context of information system security through a literature review approach. With identity federation systems and Single Sign-On (SSO), organizations can improve efficiency in managing user identities and access to various applications or services without the need for repeated login processes. Identity federation allows users to access services from different organizations using the same credentials, reducing administrative burdens and enhancing user experience. SSO, as a core component of IAM, enables users to access multiple applications with a single login, simplifying access management and increasing productivity. However, security challenges remain, especially concerning data leakage risks and potential attacks exploiting its vulnerabilities. Implementing security technologies such as multi-factor authentication and role-based access management can mitigate such threats. This study concludes that effective IAM is essential for the continuity and security of information systems in modern organizations.

Author Biographies

Cut Asiana Gemawaty, Universitas Gunadarma

Program Studi Sistem Informasi

Yuce Yuliani, Universitas Gunadarma

Program Studi Sistem Informasi

References

[1] PJJ Sistem informasi Universitas Siber Asia, “Mengamankan Sistem Informasi dalam Era Digital: Tantangan dan Strategi,” https://unsia.ac.id/author/sistem_informasi_admin/.
[2] A. Ramadhani, “Keamanan Informasi,” Nusantara Journal of Information and Library Studies (N-JILS), vol. 1, no. 1, pp. 39–51, 2018.
[3] CISA., “‘Cybersecurity and Infrastructure Security Agency Annual Report.’”
[4] G. GDPR, “General data protection regulation,” Regulation (EU), vol. 679, 2016.
[5] Z. Niqotaini, Strategi Sistem Informasi. 2024.
[6] R. S. Sandhu and P. Samarati, “Access control: principle and practice,” IEEE communications magazine, vol. 32, no. 9, pp. 40–48, 1994.
[7] V. C. Hu, D. F. Ferraiolo, R. Chandramouli, and D. R. Kuhn, Attribute-Based Access Control. Artech House, 2017.
[8] Gartner., “Market Guide for Identity and Access Management.” 2023.
[9] Ponemon Institute., “2023 Cost of a Data Breach Report.” 2023.
[10] Kania Sustisnawinata, “Identity and Access Management: Manfaat dan Pilar Utamanya,” https://www.asdf.id/apa-itu-identity-and-access-management-iam/.
[11] Y. Prasetia, “ROLE-BASED ACCESS CONTROL (RBAC) UNTUK SISTEM OTORISASI TERPUSAT BERBASIS FLASK STUDI KASUS PT. XYZ,” 2024.
[12] Ade Gusti, “Apa Itu Cloud Security dan Mengapa Penting di Era Digital Sekarang?,” https://idwebhost.com/blog/tips-memilih-cloud-security/.
[13] M. R. R. Budianto, S. F. Kurnia, and T. R. S. W. Galih, “Perspektif Islam Terhadap Ilmu Pengetahuan dan Teknologi,” Islamika: Jurnal Ilmu-Ilmu Keislaman, vol. 21, no. 01, pp. 55–61, 2021.
[14] A. Rukmana, “PERAN TEKNOLOGI DI DUNIA ISLAM,” Mumtaz: Jurnal Studi Al-Qur’an dan Keislaman, vol. 2, pp. 111–120, Oct. 2019, doi: 10.36671/mumtaz.v2i1.21.
[15] L. A. Saputra, F. M. Akbar, F. Cahyaningtias, M. P. Ningrum, and A. Fauzi, “Ancaman Keamanan Pada Sistem Informasi Manajemen Perusahaan,” Jurnal Pendidikan Siber Nusantara, vol. 1, no. 2, pp. 58–66, 2023.
Published
2024-09-30
How to Cite
GEMAWATY, Cut Asiana; YULIANI, Yuce. MANAJEMEN IDENTITAS DAN AKSES DALAM KEAMANAN SISTEM INFORMASI (PENDEKATAN LITERATURE REVIEW). Jurnal Manajamen Informatika Jayakarta, [S.l.], v. 4, n. 4, p. 396-403, sep. 2024. ISSN 2797-0930. Available at: <https://journal.stmikjayakarta.ac.id/index.php/JMIJayakarta/article/view/1527>. Date accessed: 14 feb. 2025. doi: https://doi.org/10.52362/jmijayakarta.v4i4.1527.

Most read articles by the same author(s)

Obs.: This plugin requires at least one statistics/report plugin to be enabled. If your statistics plugins provide more than one metric then please also select a main metric on the admin's site settings page and/or on the journal manager's settings pages.