Recommended Practice

Approaching Access Management

Abstract

This recommended practice suggests the essential techniques and uses of identity and access management. It also suggests good practices when designing and administering access management systems.

Document History
Document Number Version Publication Date Publication Related Information
APTA SS-ECS-RP-005-25 Original 05/27/25 Published Current

Keywords

access, authentication, cybersecurity, information security, passwords, risk management

Summary

In the computing environments needed by today’s transportation-related organizations, there is increasing complexity that requires several approaches to authenticate and authorize individuals, devices and services to perform functions and activities. This document defines sufficient practices for the various business cases that transit agencies, suppliers and partners must address. This may be an identity access management approach—although role-based access and other access and authentication methods may be involved in the discussion.

​Get Involved

Want to participate in the development of this document? Join a Working Group or Learn More

Related Documents

​ ​​