All of the following would be recommended for effective identity access management (IAM) EXCEPT?
Correct Answer: B
Step-by-Step Comprehensive Detailed Explanation with All Information Privacy Manager CIPM Study Guide References Identity and Access Management (IAM) is essential for securing access to systems and data. Let's evaluate the options:
A . User responsibility:
Ensuring users understand and comply with IAM policies is crucial for effective implementation.
B . Demographics:
Demographics (e.g., age, gender) are not relevant factors in IAM practices, as they do not contribute to authenticating or authorizing access.
C . Biometrics:
Biometric identifiers, such as fingerprints or facial recognition, are commonly used for secure authentication.
D . Credentials:
Credentials, such as usernames, passwords, or tokens, are fundamental elements of IAM systems.
CIPM Study Guide References:
Privacy Program Operational Life Cycle - "Protect" phase discusses access management strategies.