Is the process of creating a complete picture of a user’s identity, job functions, access privileges, and resource access patterns/reports with an intent to uncover possible risks posed by the user’s access and necessary steps to be taken to thwart the risks.
Identity and access management or IAM deals with creating and managing digital identities for users so that they can identify themselves to a system and gain access to its services or tools.
Internet protocol address management or IPAM is the means of planning, tracking, and managing the Internet protocol address space used in a network. The IPAM tool periodically scans a subnet and provides the availability status of IP addresses in that subnet.
ITIL (formerly, IT Infrastructure Library) is a set of best practices for the execution of IT service management in an organization