• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Texas A&M System IT

The Texas A&M University System

  • Services
    • AggieBuy
    • Concur
    • Contracts
    • Earning Codes
    • Enterprise Data Warehouse
    • FAMIS
    • Maestro
    • Position Budget
    • Security Operations Center
    • Single Sign-On
    • Time and Effort
    • TrainTraq
    • TRS
    • UIN Manager
    • Workday Services
  • Collaboration
    • Project Management
    • Organizational Change Management
    • The Texas A&M University System Technology Summit
  • Projects
    • HCM Academic Management Discovery
    • Financial Systems Modernization
  • Cybersecurity
    • News and Alerts
    • Be Cyber Savvy
    • Standards and Procedures
    • Report an Incident
    • Security Operations Center
    • Information Security Council
  • Governance & TACs
    • IT Governance Framework
    • Accessibility
    • Project Management
  • Contact
  • About
    • Members
    • CIO Blog
    • Communications
      • Guidelines
      • Logos, Color Palette and Templates
      • Writing Style
      • Web Requirements
      • Email and Email Signature
      • Statewide Cybersecurity Services Style Guide
  • Search

Primary Sidebar

You are here: Home / Cybersecurity / Information Security Council / Resources / Identity and Access Management (IAM)

Identity and Access Management (IAM)

Fundamentally, Identity & Access Management (IAM) is the process of managing who has access to what information and resources over time and can include other aspects of managing identities within an organization as well.

IAM processes are used to initiate, capture, record and manage the user identities and related access permissions to the organization’s information that is important.

Users that need to have identities and access managed extend beyond those that are directly inside the Texas A&M University System (TAMUS) members.  They can include affiliates, other universities, partners and others that are not directly tied to the organization.

Information that should be protected in this environment with IAM processes include student, faculty, staff and affiliate information, financial and audit records, sensitive technical information, research, intellectual property that has value and any information that partnered institutions entrust on infrastructure that TAMUS controls or is responsible for.

Vision/Strategy

The overall strategy is to provide a means for each of the members to maintain local control and administrative authority over their users and resources, but also to participate and share across members.  This is in keeping with the overall strategy to allow Centers of Excellence so that members can provide services across members.

Another goal is to be in alignment with Incommon’s Federated Identity Management model, which has a number of benefits for members.

Copyright © 2022 Texas A&M University System All rights reserved.

301 Tarrow Street, College Station, TX 77840 | MAP | Phone: (979) 458-7700 | email: tamus-webmaster@tamus.edu
State of Texas |  Texas Homeland Security |  Texas Veterans Portal |  Statewide Search |  Risk, Fraud & Misconduct Hotline |  Privacy |  Web Accessibility |  State Link Policy |  Campus Carry

Texas A&M University System
Security Operations Center Governance Board

Purpose

Provides cybersecurity services to enhance the IT security position of A&M System members

 

Responsibilities

Provide financial oversight, guiding principles and strategic direction for the A&M System shared service implementation of the Security Operations Center

 

Members

Chair: SOC Board Member (rotates)
Vice Chair: SOC Board Member (rotates)
Secretary: SOC Board Member (rotates)

11 Representatives nominated and elected by the Information Security Council, consisting of:
– Two University Chief Information Officers
– One Agency Chief Information Officer
– Two University Information Security Officers
– One Agency Information Security Officer
– Five Member Cybersecurity Functional Professionals (IT Manager, Network / Security / System Administrator, Analyst, Engineer, etc.)

 

 

Upcoming Meetings

2021

  • November 4

2022

  • February 28