Recommended Practice
Approaching Access Management
Abstract
This recommended practice suggests the essential techniques and uses of identity and access management. It also suggests good practices when designing and administering access management systems.
Document History
Document Number | Version | Publication Date | Publication | Related Information |
---|---|---|---|---|
APTA SS-ECS-RP-005-25 | Original | 05/27/25 | Published | Current |
Keywords
access, authentication, cybersecurity, information security, passwords, risk management
Summary
In the computing environments needed by today’s transportation-related organizations, there is increasing complexity that requires several approaches to authenticate and authorize individuals, devices and services to perform functions and activities. This document defines sufficient practices for the various business cases that transit agencies, suppliers and partners must address. This may be an identity access management approach—although role-based access and other access and authentication methods may be involved in the discussion.
Get Involved
Want to participate in the development of this document? Join a Working Group or Learn More
Related Documents
|