The policy-based centralized orchestration of user identity management and access control.
Identity Governance ensures that the right people have the right access to the right resources at the right time. This includes provisioning, de-provisioning, access reviews, and segregation of duties controls. Strong identity governance is fundamental to insider risk management, as it prevents excessive access accumulation that enables insider threats.