IAM Comprehensive List - razmipatel/Random GitHub Wiki

Comprehensive IAM Controls for Cloud Applications (Aligned to NIST SP 800-53 Rev. 5 & CSF)

This markdown document provides a comprehensive list of IAM controls applicable to SaaS, PaaS, and IaaS platforms, covering authentication, access control, identity lifecycle, privileged access, and governance.

Each control includes:

  • Control Name
  • Description (NIST-aligned)
  • Expected Implementation Evidence
  • Platform Applicability

Due to length, only the summary description is presented here. Full detail is provided in the exported document.

Control Name Description Expected Implementation Evidence Platform Applicability
IAM Governance Policy & Procedures Establish documented IAM policy defining responsibilities and processes. Policy document, governance role assignments, periodic reviews. All
Identity Lifecycle Management Manage full user and service identity lifecycle with defined owners. Provisioning/deprovisioning records, inactive account reports. All
Multi-Factor Authentication (MFA) Enforce MFA for all users, especially privileged roles. Config settings, enforcement policies, logs. All
Federated Single Sign-On (SSO) Use SAML/OIDC with centralized IdP to unify identity policies. SSO configs, IdP metadata, authentication flow evidence. All
Authenticator Management & Password Policy Securely manage passwords, keys, certificates, API secrets. Password policies, secrets vault logs, rotation evidence. All
Role-Based Access Control (RBAC) Access decisions based on job-role-aligned permissions. Role definitions, mappings, assignment logs. All
Attribute-Based Access Control (ABAC) Dynamic access decisions based on attributes/tags. Attribute policies, enforcement tests. PaaS, IaaS
Least Privilege Enforcement Enforce minimum necessary access to perform duties. Role reviews, scope validation. All
Separation of Duties (SoD) Prevent conflicting role assignments and ensure oversight. SoD matrix, review logs, conflict resolution process. All
Privileged Access Management Strict control of privileged identities and vaulting. Inventory of privileged accounts, session logs, MFA proofs. All
Non-Human Identities & Service Accounts Govern service and app identities with least privilege. Inventory, credential rotation records, ownership mappings. All
IAM Activity Logging & Monitoring Monitor all identity events, logins, role changes. SIEM rules, log samples, alerts on abnormal behavior. All
Periodic Access Reviews & Recertification Regular access certification by managers. Review logs, attestation reports, revocation actions. All
Exception and Emergency Access Handling Manage break-glass accounts and policy exceptions. Usage logs, exception approvals, expiration monitoring. All

For complete descriptions and validations, refer to the full report or request a formatted PDF/Excel export.