How users are identified and the roles they are then assigned
The systems, information, and other areas protected by IAM
The correct levels of protection and access for sensitive data, systems, information, and locations
Adding, removing, and amending individuals in the IAM system
Adding, removing, and amending a role’s access rights in the IAM system