{"id":3844,"date":"2023-11-23T17:15:53","date_gmt":"2023-11-23T14:15:53","guid":{"rendered":"https:\/\/uzmanposta.com\/blog\/?p=3844"},"modified":"2023-12-25T14:30:33","modified_gmt":"2023-12-25T11:30:33","slug":"iam","status":"publish","type":"post","link":"https:\/\/uzmanposta.com\/blog\/iam\/","title":{"rendered":"IAM (Identity &amp; Access Management) Nedir? IAM vs. PAM Aras\u0131ndaki Farklar"},"content":{"rendered":"\n<p>Siber tehditlerin \u00e7o\u011falmas\u0131 ve BT ortamlar\u0131n\u0131n karma\u015f\u0131kl\u0131\u011f\u0131n\u0131n artmas\u0131 ile birlikte modern i\u015fletmeler, sa\u011flam Kimlik ve Eri\u015fim Y\u00f6netimi (IAM) \u00e7\u00f6z\u00fcmlerine duyulan kritik ihtiyac\u0131n fark\u0131na varmaktad\u0131r. Bu y\u00fczden IAM, kullan\u0131c\u0131 kimliklerini, dijital ayr\u0131cal\u0131klar\u0131n\u0131 ve eri\u015febilecekleri kaynaklar\u0131 y\u00f6netmek ve kontrol etmek i\u00e7in hayati bir \u00e7er\u00e7eve olarak ortaya \u00e7\u0131km\u0131\u015ft\u0131r.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">IAM (Identity &amp; Access Management) Nedir?&nbsp;<\/h2>\n\n\n\n<p>Gartner&#8217;a g\u00f6re &#8220;<strong>Identity and Access Management (IAM)<\/strong>, do\u011fru ki\u015filerin do\u011fru kaynaklara do\u011fru zamanlarda ve do\u011fru nedenlerle eri\u015fmesini sa\u011flayan bir g\u00fcvenlik disiplinidir.&#8221; Ba\u015fka bir deyi\u015fle, kimlik ad\u0131 verilen benzersiz kullan\u0131c\u0131 profillerini kullanarak kullan\u0131c\u0131lar\u0131 cihazlar, uygulamalar, dosyalar, a\u011flar ve daha fazlas\u0131 gibi BT kaynaklar\u0131na g\u00fcvenli bir \u015fekilde ba\u011flayan bir BT \u00e7\u00f6z\u00fcmleri kategorisidir.<\/p>\n\n\n\n<p>Her bir benzersiz kullan\u0131c\u0131 i\u00e7in bir kimlik yap\u0131land\u0131r\u0131l\u0131p bu kullan\u0131c\u0131lara WiFi ve \u015firket sunucular\u0131 gibi \u015feylere kontroll\u00fc eri\u015fim sa\u011flan\u0131rken, i\u015flerini yapmak i\u00e7in ihtiya\u00e7 duymad\u0131klar\u0131 dijital varl\u0131klara eri\u015fim k\u0131s\u0131tlanabilir.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Kimlik Eri\u015fim Y\u00f6netimine \u0130htiyac\u0131n\u0131z Var m\u0131?&nbsp;<\/h2>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-full\"><img decoding=\"async\" width=\"1000\" height=\"500\" src=\"https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2023\/11\/kimlik-erisim-yonetimine-ihtiyaciniz-var-mi.jpeg\" alt=\"Kimlik Eri\u015fim Y\u00f6netimine \u0130htiyac\u0131n\u0131z Var m\u0131?\u00a0\" class=\"wp-image-3882\" srcset=\"https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2023\/11\/kimlik-erisim-yonetimine-ihtiyaciniz-var-mi.jpeg 1000w, https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2023\/11\/kimlik-erisim-yonetimine-ihtiyaciniz-var-mi-300x150.jpeg 300w, https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2023\/11\/kimlik-erisim-yonetimine-ihtiyaciniz-var-mi-768x384.jpeg 768w, https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2023\/11\/kimlik-erisim-yonetimine-ihtiyaciniz-var-mi-360x180.jpeg 360w, https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2023\/11\/kimlik-erisim-yonetimine-ihtiyaciniz-var-mi-750x375.jpeg 750w\" sizes=\"(max-width: 1000px) 100vw, 1000px\" \/><\/figure><\/div>\n\n\n\n<p>Basit\u00e7e s\u00f6ylemek gerekirse, hibrit i\u015f yerleri ve uzaktan \u00e7al\u0131\u015fanlar\u0131n norm haline gelmesiyle, bir IAM stratejisine sahip olmamak art\u0131k bir se\u00e7enek de\u011fildir. Kimlik ihlallerinin veri ihlallerinin bir numaral\u0131 nedeni oldu\u011fu d\u00fc\u015f\u00fcn\u00fcld\u00fc\u011f\u00fcnde, IAM belki de bir numaral\u0131 g\u00fcvenlik arac\u0131d\u0131r.<\/p>\n\n\n\n<p>G\u00fcn\u00fcm\u00fczde BT&#8217;nin ana g\u00f6revi, uzaktan \u00e7al\u0131\u015fanlar\u0131n kimliklerini en iyi nas\u0131l koruyacaklar\u0131n\u0131 belirlemek ve ayn\u0131 zamanda \u00e7al\u0131\u015fmak i\u00e7in ihtiya\u00e7 duyduklar\u0131 kaynaklara g\u00fcvenli bir \u015fekilde eri\u015fmelerine yard\u0131mc\u0131 olmakt\u0131r. IAM bu fikri destekler.<\/p>\n\n\n\n<p>Modern bir IAM platformu, kullan\u0131c\u0131lara hat\u0131rlamalar\u0131 ve kullanmalar\u0131 i\u00e7in tek bir kimlik sa\u011flarken BT y\u00f6neticilerine de en \u00fcst d\u00fczeyde kontrol ve merkezile\u015ftirme sunar.<\/p>\n\n\n\n<p>IAM&#8217;in ba\u015flang\u0131\u00e7ta her ne kadar faydalar\u0131 olsa da, her i\u015fletme i\u00e7in gerekli olmayabilir.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">IAM&#8217;nin \u00d6zellikleri<\/h2>\n\n\n\n<p>IAM&#8217;in ana \u00f6zelliklerinden baz\u0131lar\u0131 a\u015fa\u011f\u0131daki \u015fekildedir:<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">1. \u00c7ok Fakt\u00f6rl\u00fc Kimlik Do\u011frulama<\/h3>\n\n\n\n<p>\u00c7ok fakt\u00f6rl\u00fc kimlik do\u011frulama (MFA), iki fakt\u00f6rl\u00fc kimlik do\u011frulama (2FA) gibi, kullan\u0131c\u0131lara eri\u015fim izni vermek i\u00e7in kullan\u0131c\u0131 ad\u0131 ve parola d\u0131\u015f\u0131nda iki veya daha fazla do\u011fru kimlik bilgisi sa\u011flamalar\u0131n\u0131 isteyerek sistemlerinize ve uygulamalar\u0131n\u0131za daha fazla koruma katman\u0131 ekleyen bir teknolojidir.<\/p>\n\n\n\n<p>\u00d6rne\u011fin, bir uygulamaya ba\u015far\u0131l\u0131 bir \u015fekilde giri\u015f yapmak i\u00e7in belirli bir s\u00fcre i\u00e7inde girmeniz gereken k\u0131sa mesaj veya e-posta yoluyla g\u00f6nderilen bir kodu g\u00f6ndermeniz gerekebilir.<\/p>\n\n\n\n<p>MFA, izinsiz giri\u015flerin ve k\u00f6t\u00fc niyetli sald\u0131r\u0131lar\u0131n verilerinize ve sistemlerinize eri\u015fmesini \u00f6nlemeye yard\u0131mc\u0131 olur.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">2. \u00c7oklu Oturum A\u00e7ma (SSO)<\/h3>\n\n\n\n<p>\u00c7oklu oturum a\u00e7ma, bir sisteme veya birden fazla uygulamaya sorunsuz bir \u015fekilde giri\u015f yapmak i\u00e7in tek seferde girilecek kullan\u0131c\u0131 ad\u0131 ve \u015fifre gibi tek bir kimlik bilgisi setini i\u00e7erir. Kullan\u0131c\u0131 deneyimini ve \u00e7al\u0131\u015fanlar\u0131n\u0131z\u0131n \u00fcretkenli\u011fini art\u0131r\u0131r.<\/p>\n\n\n\n<p>\u00d6rne\u011fin, her seferinde kimlik bilgilerini girmek zorunda kalmadan tek bir Google hesab\u0131 kullanarak Gmail, YouTube vb. gibi birden fazla Google \u00fcr\u00fcn\u00fcne otomatik olarak eri\u015febilirsiniz. B\u00f6ylece, kullan\u0131c\u0131lar daha fazla kolayl\u0131k elde ederken, i\u015fletmeler de birden fazla uygulamada kullan\u0131c\u0131 tercihleri, davran\u0131\u015f, etkinlik vb. gibi de\u011ferli i\u00e7g\u00f6r\u00fcler toplayabilir.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">3. Ya\u015fam D\u00f6ng\u00fcs\u00fc Y\u00f6netimi<\/h3>\n\n\n\n<p>Bir\u00e7ok IAM \u00e7\u00f6z\u00fcm\u00fc, \u00e7al\u0131\u015fan ya\u015fam d\u00f6ng\u00fcs\u00fc boyunca kullan\u0131c\u0131 eri\u015fim ayr\u0131cal\u0131klar\u0131n\u0131 y\u00f6netmek i\u00e7in y\u00f6netim ara\u00e7lar\u0131 sa\u011flar. Kullan\u0131c\u0131lar\u0131n hesap verilerini g\u00fcncellemelerine ve eri\u015fim haklar\u0131n\u0131 kendi ba\u015flar\u0131na talep etmelerine olanak sa\u011flamak i\u00e7in kendi kendine yard\u0131m portallar\u0131 sa\u011flar. Ayr\u0131ca bu ara\u00e7lar, g\u00fcvenlik ve BT ekiplerinin uyumluluk i\u00e7in adli t\u0131p ve denetimleri desteklemesine de yard\u0131mc\u0131 olur.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">4. Anomali Tespiti<\/h3>\n\n\n\n<p>IAM&#8217;in bir par\u00e7as\u0131 olarak anomali tespiti kullanan i\u015fletmeler, sistem ve verilerini \u00e7evrimi\u00e7i tehditlere ve veri ihlallerine kar\u015f\u0131 koruyabilir. Baz\u0131 IAM \u00e7\u00f6z\u00fcmleri, normal davran\u0131\u015ftan anormal g\u00f6r\u00fcnen trafik h\u0131z\u0131, oturum a\u00e7ma d\u00fczeni alg\u0131lama vb. gibi sinyalleri izleyebilir. Bu \u015fekilde, IAM sistemi ihlalleri ve tehditleri belirleyebilir, b\u00f6ylece hala zaman varken bunlar\u0131 engelleyebilirsiniz.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">IAM Neden \u00d6nemlidir?<\/h2>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-full\"><img decoding=\"async\" width=\"1000\" height=\"500\" src=\"https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2023\/11\/iam-neden-onemlidir.jpeg\" alt=\"IAM Neden \u00d6nemlidir?\" class=\"wp-image-3881\" srcset=\"https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2023\/11\/iam-neden-onemlidir.jpeg 1000w, https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2023\/11\/iam-neden-onemlidir-300x150.jpeg 300w, https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2023\/11\/iam-neden-onemlidir-768x384.jpeg 768w, https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2023\/11\/iam-neden-onemlidir-360x180.jpeg 360w, https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2023\/11\/iam-neden-onemlidir-750x375.jpeg 750w\" sizes=\"(max-width: 1000px) 100vw, 1000px\" \/><\/figure><\/div>\n\n\n\n<p>IAM, \u00e7evrimi\u00e7i sald\u0131r\u0131lara e\u011filimli g\u00fcn\u00fcm\u00fcz i\u015f d\u00fcnyas\u0131nda \u00f6nemli bir role sahiptir. IAM&#8217;in \u00f6nemli olmas\u0131n\u0131n baz\u0131 nedenleri a\u015fa\u011f\u0131daki \u015fekildedir:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>G\u00fcvenli\u011fi art\u0131r\u0131r:<\/strong> Kullan\u0131c\u0131 eri\u015fimini kontrol edebilirseniz, siber sald\u0131r\u0131lar\u0131n ve veri ihlallerinin olu\u015fumunu azaltabilir veya ortadan kald\u0131rabilirsiniz. IAM ayr\u0131ca tehlikeye at\u0131lan oturum a\u00e7ma bilgilerinin yay\u0131lmas\u0131n\u0131 azaltabilir, yetkisiz eri\u015fimi k\u0131s\u0131tlayabilir ve kimlik av\u0131, fidye yaz\u0131l\u0131m\u0131, vir\u00fcsler vb. gibi siber sald\u0131r\u0131lara kar\u015f\u0131 koruma sa\u011flayabilir.<\/li><li><strong>Uyumlulu\u011fun s\u00fcrd\u00fcr\u00fclmesine yard\u0131mc\u0131 olur: <\/strong>IAM \u00e7\u00f6z\u00fcmlerini uygulayarak m\u00fc\u015fterilerinizin verilerini g\u00fcvence alt\u0131na al\u0131rken kendinizi uyumluluk risklerinden kurtarabilirsiniz. (HIPAA, GDPR gibi yasal gereklilikleri kar\u015f\u0131laman\u0131za yard\u0131mc\u0131 olur).<\/li><li><strong>Son kullan\u0131c\u0131 deneyimini iyile\u015ftirir:<\/strong> SSO ve MFA gibi g\u00fcvenlik teknolojilerini uygulayarak, kullan\u0131c\u0131lar verilerinin g\u00fcvende oldu\u011fundan emin olabilir. Ayr\u0131ca, SSO ve biyometri gibi sistemlerle kullan\u0131c\u0131lar h\u0131zl\u0131 bir \u015fekilde oturum a\u00e7abilir, bu da deneyimlerini geli\u015ftirir ve bir uygulamaya her eri\u015ftiklerinde \u015fifrelerini hat\u0131rlamaktan kurtar\u0131r.<\/li><li><strong>\u00dcretkenli\u011fi art\u0131r\u0131r:<\/strong> \u00c7al\u0131\u015fanlar\u0131n\u0131z kendilerine tahsis edilen kaynak ve sistemlere kolayca eri\u015febildiklerinde, zaman kaybetmeden \u00fcretkenliklerini art\u0131rabilir. Ayr\u0131ca ekip i\u00e7inde ve d\u0131\u015far\u0131dan ki\u015filerle (sat\u0131c\u0131lar, ortaklar vb.) de i\u015fbirli\u011finizi art\u0131r\u0131r.<\/li><\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">IAM T\u00fcrleri<\/h2>\n\n\n\n<p>Bir i\u015fletmenin m\u00fc\u015fteriler, i\u015f ortaklar\u0131 ve \u00e7al\u0131\u015fanlar gibi farkl\u0131 kullan\u0131c\u0131 t\u00fcrleri ve hepsinin farkl\u0131 kimlik ihtiya\u00e7lar\u0131 olabilir. Bu nedenle, zorluklar\u0131n\u0131 ayr\u0131 ayr\u0131 ele alabilecek IAM sistemlerini uygulamak \u00e7ok \u00f6nemlidir ya da tek bir IAM platformu kullan\u0131yorsan\u0131z, kullan\u0131c\u0131lar\u0131n bunlar i\u00e7in farkl\u0131 stratejiler kullanmas\u0131n\u0131 sa\u011flaman\u0131z gerekir.<\/p>\n\n\n\n<p>Kullan\u0131c\u0131lara g\u00f6re IAM t\u00fcrleri a\u015fa\u011f\u0131daki \u015fekildedir:<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">1. M\u00fc\u015fteriler i\u00e7in IAM<\/h3>\n\n\n\n<p>M\u00fc\u015fteri Kimli\u011fi ve Eri\u015fim Y\u00f6netimi (CIAM), kullan\u0131c\u0131lara y\u00f6nelik kullan\u0131c\u0131 eri\u015fimini kontrol eden bir IAM sistemini ifade eder. Kullan\u0131c\u0131 kimlik bilgilerinin do\u011frulanmas\u0131 ve y\u00f6netilmesi ile ilgilenir ve veri a\u00e7\u0131s\u0131ndan zengin kimlik profilleri ile onlar\u0131 daha iyi anlaman\u0131za yard\u0131mc\u0131 olur. Kullan\u0131c\u0131 i\u00e7g\u00f6r\u00fcleriyle onlara de\u011fer sa\u011flarken daha iyi bir son kullan\u0131c\u0131 deneyimi sunman\u0131z\u0131 sa\u011flar.<\/p>\n\n\n\n<p>Veri toplamay\u0131 i\u00e7erdi\u011finden, CIAM veri gizlili\u011fi d\u00fczenlemelerine uyma sorumlulu\u011funu da beraberinde getirir. Bu nedenle, yerel ve federal yasalarla uyumlu oldu\u011funuzdan emin olman\u0131z \u015fartt\u0131r.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">2. \u00c7al\u0131\u015fanlar i\u00e7in IAM<\/h3>\n\n\n\n<p>\u00c7al\u0131\u015fanlar\u0131n\u0131z yetki d\u00fczeylerine ba\u011fl\u0131 olarak farkl\u0131 uygulama ve sistemlere eri\u015fim yetkisine sahiptir. Bu nedenle, eri\u015fimlerini y\u00f6netmek ve yaln\u0131zca kendilerine sa\u011flanan sistem ve kaynaklara eri\u015fmelerini sa\u011flamak i\u00e7in bir sisteme ihtiyac\u0131n\u0131z vard\u0131r. Bunun i\u00e7in, \u00e7al\u0131\u015fanlar\u0131n\u0131z\u0131n eri\u015fimlerini y\u00f6netmek ve kontrol etmek i\u00e7in kulland\u0131klar\u0131 t\u00fcm sistemleri ve uygulamalar\u0131 entegre etmek \u00fczere bir IAM da\u011f\u0131tabilirsiniz.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">3. \u0130\u015f Ortaklar\u0131 i\u00e7in IAM<\/h3>\n\n\n\n<p>\u0130\u015f ortaklar\u0131n\u0131z i\u00e7in sorunsuz ve g\u00fcvenli eri\u015fim kontrollerine sahip olmak i\u00e7in sa\u011flam bir IAM&#8217;ye ihtiyac\u0131n\u0131z vard\u0131r. \u015eirket i\u00e7i bir IAM olu\u015fturabilseniz de, artan kullan\u0131c\u0131lar\u0131 \u00f6l\u00e7eklendirmekte zorlanabilirsiniz. Bunun i\u00e7in, ne kadar geli\u015fmi\u015f teknoloji kullan\u0131rlarsa kullans\u0131nlar kullan\u0131c\u0131lar\u0131 tan\u0131mlamak i\u00e7in \u00fc\u00e7\u00fcnc\u00fc taraf bir IAM \u00e7\u00f6z\u00fcm\u00fc kullanabilirsiniz.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">IAM&#8217;de Pop\u00fcler Kimlik Do\u011frulama Y\u00f6ntemleri T\u00fcrleri<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">Parola Tabanl\u0131 Kimlik Do\u011frulama<\/h3>\n\n\n\n<p>Parola tabanl\u0131 kimlik do\u011frulama en yayg\u0131n ve en \u00e7ok kullan\u0131lan y\u00f6ntemdir. Kullan\u0131c\u0131lar kimliklerini do\u011frulamak i\u00e7in benzersiz bir kullan\u0131c\u0131 ad\u0131 ve buna kar\u015f\u0131l\u0131k gelen bir parola sa\u011flar.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">\u015eifresiz Kimlik Do\u011frulama<\/h3>\n\n\n\n<p>Kullan\u0131c\u0131lar parolaya ihtiya\u00e7 duymadan OTP, y\u00fcz tan\u0131ma vb. y\u00f6ntemlerle do\u011frudan kimlik do\u011frulamas\u0131 yapabilir. Bu s\u00fcre\u00e7, parola h\u0131rs\u0131zl\u0131\u011f\u0131 ile ili\u015fkili riskleri azalt\u0131r.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">\u00c7ok Fakt\u00f6rl\u00fc Kimlik Do\u011frulama (MFA)<\/h3>\n\n\n\n<p>\u00c7ok Fakt\u00f6rl\u00fc Kimlik Do\u011frulama, kullan\u0131c\u0131lar\u0131n yaln\u0131zca bir parolan\u0131n \u00f6tesinde ek fakt\u00f6rler sa\u011flamas\u0131n\u0131 gerektirerek ekstra bir g\u00fcvenlik katman\u0131 ekler. MFA, birden fazla kimlik do\u011frulama fakt\u00f6r\u00fcn\u00fc birle\u015ftirerek g\u00fcvenli\u011fi \u00f6nemli \u00f6l\u00e7\u00fcde art\u0131r\u0131r.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Biyometrik Kimlik Do\u011frulama<\/h3>\n\n\n\n<p>Biyometrik kimlik do\u011frulama, bireylerin kimliklerini do\u011frulamak i\u00e7in parmak izi, y\u00fcz \u00f6zellikleri, iris desenleri veya ses tan\u0131ma gibi benzersiz biyolojik \u00f6zelliklerini kullan\u0131r.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Tek Kullan\u0131ml\u0131k \u015eifre (OTP)<\/h3>\n\n\n\n<p>Tek kullan\u0131ml\u0131k parolalar, tek bir kullan\u0131m veya s\u0131n\u0131rl\u0131 bir s\u00fcre i\u00e7in olu\u015fturulan ge\u00e7ici parolalard\u0131r. OTP&#8217;ler genellikle kullan\u0131c\u0131lar\u0131n mobil cihazlar\u0131na SMS, e-posta yoluyla g\u00f6nderilir veya kimlik do\u011frulay\u0131c\u0131 uygulamalar taraf\u0131ndan olu\u015fturulur.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Sertifika Tabanl\u0131 Kimlik Do\u011frulama<\/h3>\n\n\n\n<p>Sertifika tabanl\u0131 kimlik do\u011frulama, kullan\u0131c\u0131n\u0131n cihaz\u0131nda veya ak\u0131ll\u0131 kart\u0131nda depolanan dijital sertifikalar\u0131n kullan\u0131m\u0131n\u0131 i\u00e7erir. Bu sertifikalar g\u00fcvenilir bir otorite taraf\u0131ndan verilir.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Sosyal Giri\u015f<\/h3>\n\n\n\n<p>Sosyal oturum a\u00e7ma, kullan\u0131c\u0131lar\u0131n Facebook, Google veya LinkedIn hesaplar\u0131 gibi mevcut sosyal medya kimlik bilgilerini kullanarak kimliklerini do\u011frulamalar\u0131na olanak tan\u0131r. Bu y\u00f6ntem oturum a\u00e7ma s\u00fcrecini basitle\u015ftirir.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Risk Tabanl\u0131 Kimlik Do\u011frulama<\/h3>\n\n\n\n<p>Risk tabanl\u0131 kimlik do\u011frulama, bir kimlik do\u011frulama giri\u015fimi ile ili\u015fkili risk d\u00fczeyini de\u011ferlendirmek i\u00e7in kullan\u0131c\u0131 davran\u0131\u015f\u0131, konum, cihaz bilgileri ve di\u011fer ba\u011flamsal veriler gibi \u00e7e\u015fitli fakt\u00f6rleri analiz eder.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">IAM \u00c7\u00f6z\u00fcmlerinin Uygulanmas\u0131 i\u00e7in En \u0130yi Uygulamalar<\/h2>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-full\"><img decoding=\"async\" width=\"1000\" height=\"500\" src=\"https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2023\/11\/iam-cozumlerinin-uygulanmasi-icin-en-iyi-uygulamalar.jpeg\" alt=\"IAM \u00c7\u00f6z\u00fcmlerinin Uygulanmas\u0131 i\u00e7in En \u0130yi Uygulamalar\" class=\"wp-image-3883\" srcset=\"https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2023\/11\/iam-cozumlerinin-uygulanmasi-icin-en-iyi-uygulamalar.jpeg 1000w, https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2023\/11\/iam-cozumlerinin-uygulanmasi-icin-en-iyi-uygulamalar-300x150.jpeg 300w, https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2023\/11\/iam-cozumlerinin-uygulanmasi-icin-en-iyi-uygulamalar-768x384.jpeg 768w, https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2023\/11\/iam-cozumlerinin-uygulanmasi-icin-en-iyi-uygulamalar-360x180.jpeg 360w, https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2023\/11\/iam-cozumlerinin-uygulanmasi-icin-en-iyi-uygulamalar-750x375.jpeg 750w\" sizes=\"(max-width: 1000px) 100vw, 1000px\" \/><\/figure><\/div>\n\n\n\n<h3 class=\"wp-block-heading\">1. Net hedefler tan\u0131mlay\u0131n<\/h3>\n\n\n\n<p>IAM uygulamas\u0131 i\u00e7in i\u015fletmenizin hedeflerini ve \u00f6nceliklerini tan\u0131mlay\u0131n. Hedefler aras\u0131nda g\u00fcvenli\u011fi artt\u0131rman\u0131n, \u00fcretkenli\u011fi geli\u015ftirmenin ve maliyetleri d\u00fc\u015f\u00fcrmenin yer almas\u0131 gerekti\u011fini unutmay\u0131n.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">2. Kapsaml\u0131 bir IAM stratejisi geli\u015ftirin<\/h3>\n\n\n\n<p>\u0130\u015fletmenizin kritik olarak tan\u0131mlad\u0131\u011f\u0131 hedeflerle uyumlu bir IAM stratejisi geli\u015ftirin. Bu, i\u015fletmenin \u00f6ncelikleri g\u00f6z \u00f6n\u00fcnde bulundurularak ve mevcut altyap\u0131, sistemler ve uygulamalar dikkate al\u0131narak ger\u00e7ekle\u015ftirilir.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">3. Do\u011fru IAM \u00e7\u00f6z\u00fcm\u00fcn\u00fc se\u00e7in<\/h3>\n\n\n\n<p>\u0130\u015fletmenizin ihtiya\u00e7lar\u0131, b\u00fct\u00e7esi ve hedefleriyle uyumlu bir IAM \u00e7\u00f6z\u00fcm\u00fc se\u00e7in. \u0130\u015fletmeniz i\u00e7in do\u011fru IAM \u00e7\u00f6z\u00fcm\u00fcn\u00fc se\u00e7erken \u00f6l\u00e7eklenebilirlik, kullan\u0131m kolayl\u0131\u011f\u0131 ve sat\u0131c\u0131 deste\u011fi gibi fakt\u00f6rleri g\u00f6z \u00f6n\u00fcnde bulundurman\u0131n \u00f6nemini unutturmay\u0131n.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Privileged Access Management (PAM) Nedir?<\/h2>\n\n\n\n<p>Bir dizindeki her ayr\u0131cal\u0131kl\u0131 kullan\u0131c\u0131ya, rol tabanl\u0131 veya \u00f6znitelik tabanl\u0131 eri\u015fim kontrollerine dayal\u0131 olarak baz\u0131 kaynaklara eri\u015fim izni verilir. Ayr\u0131cal\u0131kl\u0131 eri\u015fim y\u00f6netimi, genellikle kimlik ve eri\u015fim y\u00f6netimi teknolojilerini kullanarak kritik \u015firket kaynaklar\u0131na eri\u015fimi kontrol etme ve izleme s\u00fcrecidir.<\/p>\n\n\n\n<p>\u015eirketler kimlik bilgilerini y\u00f6netmek, bir kullan\u0131c\u0131 bir \u015firket kayna\u011f\u0131na eri\u015fmeye \u00e7al\u0131\u015ft\u0131\u011f\u0131nda kullan\u0131c\u0131 kimliklerini do\u011frulamak ve normalde belirli kaynaklara eri\u015femeyen kimliklere tam zaman\u0131nda eri\u015fim sa\u011flamak i\u00e7in <a href=\"https:\/\/uzmanposta.com\/blog\/pam\/\">PAM \u00e7\u00f6z\u00fcmlerini<\/a> kullan\u0131r. Genellikle PAM ara\u00e7lar\u0131, \u015firketlerin kullan\u0131m modellerini raporlamas\u0131na ve uyumluluk standartlar\u0131n\u0131 kar\u015f\u0131lamas\u0131na yard\u0131mc\u0131 olmak i\u00e7in ayr\u0131nt\u0131l\u0131 oturum izleme ve eri\u015fim g\u00fcnl\u00fckleri de sunar.<\/p>\n\n\n\n<p><strong>Daha fazla bilgi i\u00e7in<\/strong>:<strong> <\/strong><a href=\"https:\/\/uzmanposta.com\/blog\/pam\/\">Privileged Access Management (PAM) Nedir? PAM vs. IAM Aras\u0131ndaki Farklar<\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">PAM&#8217;\u0131n Avantajlar\u0131<\/h2>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Geli\u015ftirilmi\u015f g\u00fcvenlik:<\/strong> PAM, ayr\u0131cal\u0131kl\u0131 hesab\u0131n k\u00f6t\u00fcye kullan\u0131lmas\u0131 riskini azaltmaya yard\u0131mc\u0131 olur ve bir i\u015fletmenin sald\u0131r\u0131 y\u00fczeyini azalt\u0131r. Kritik varl\u0131klara ve hassas verilere yetkisiz eri\u015fimi \u00f6nlemeye yard\u0131mc\u0131 olur.<\/li><li><strong>Uyumluluk:<\/strong> PAM, i\u015fletmeleirn HIPAA ve GDPR gibi d\u00fczenleyici gerekliliklere uymas\u0131na yard\u0131mc\u0131 olur.<\/li><li><strong>Operasyonel verimlilik:<\/strong> PAM, ayr\u0131cal\u0131kl\u0131 eri\u015fim y\u00f6netimi s\u00fcrecini kolayla\u015ft\u0131rmaya ve BT ekiplerinin i\u015f y\u00fck\u00fcn\u00fc azaltmaya yard\u0131mc\u0131 olur. PAM \u00e7\u00f6z\u00fcmleri, s\u00fcre\u00e7leri desteklemek i\u00e7in uygun prosed\u00fcrler ve genellikle otomasyonlar ile eri\u015fim taleplerini, onaylar\u0131 ve iptalleri daha verimli bir \u015fekilde y\u00f6netmelerini sa\u011flar.<\/li><\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">PAM&#8217;i Uygulamak i\u00e7in En \u0130yi Uygulamalar<\/h2>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>T\u00fcm ayr\u0131cal\u0131kl\u0131 hesaplar\u0131 ke\u015ffedin ve kataloglay\u0131n:<\/strong> Kurum genelindeki t\u00fcm ayr\u0131cal\u0131kl\u0131 hesaplar\u0131 ke\u015ffetmek i\u00e7in kapsaml\u0131 bir denetim ger\u00e7ekle\u015ftirin. Bu, t\u00fcm hesaplar\u0131n bir envanterini olu\u015fturmak ve her hesap i\u00e7in sahip atamak i\u00e7in kullan\u0131labilir.<\/li><li><strong>G\u00fc\u00e7l\u00fc parola politikalar\u0131 uygulay\u0131n:<\/strong> Ayr\u0131cal\u0131kl\u0131 hesaplar i\u00e7in parola karma\u015f\u0131kl\u0131\u011f\u0131 gereksinimleri, rotasyon politikalar\u0131 ve \u00e7ok fakt\u00f6rl\u00fc kimlik do\u011frulama dahil olmak \u00fczere g\u00fc\u00e7l\u00fc parola politikalar\u0131 uygulay\u0131n.<\/li><li><strong>Ayr\u0131cal\u0131kl\u0131 eri\u015fimi izleyin ve g\u00fcnl\u00fc\u011fe kaydedin: <\/strong>Ayr\u0131cal\u0131kl\u0131 eri\u015fime sahip kullan\u0131c\u0131lar i\u015fletmenin en savunmas\u0131z ve kritik sistemlerine, verilerine ve kaynaklar\u0131na eri\u015fme e\u011filimindedir. Kullan\u0131c\u0131, sistem ve komut sat\u0131r\u0131 etkinli\u011fi dahil olmak \u00fczere t\u00fcm ayr\u0131cal\u0131kl\u0131 eri\u015fim etkinliklerinin izlenmesi ve g\u00fcnl\u00fc\u011fe kaydedilmesi \u00f6nerilir.<\/li><li><strong>En az ayr\u0131cal\u0131k modelini uygulay\u0131n:<\/strong> PAM i\u00e7in yayg\u0131n bir uygulama, kullan\u0131c\u0131lara i\u015f rollerine ve sorumluluklar\u0131na g\u00f6re ayr\u0131cal\u0131klar uygulamakt\u0131r. Bu noktada en az ayr\u0131cal\u0131k ilkesini uygulay\u0131n ve eri\u015fimi yaln\u0131zca i\u015fi ger\u00e7ekle\u015ftirmek i\u00e7in gerekli olanlarla s\u0131n\u0131rlay\u0131n.<\/li><li><strong>Eri\u015fim haklar\u0131n\u0131 d\u00fczenli olarak g\u00f6zden ge\u00e7irin:<\/strong> T\u00fcm siber g\u00fcvenlik \u00f6nlemleri gibi PAM de tek seferlik bir faaliyet de\u011fildir. Kullan\u0131c\u0131lar\u0131n sadece ihtiya\u00e7 duyduklar\u0131 \u015feylere eri\u015febilmelerini sa\u011flamak i\u00e7in eri\u015fim haklar\u0131n\u0131n periyodik olarak g\u00f6zden ge\u00e7irilmesi gerekir. Bu, gereksiz eri\u015fim haklar\u0131n\u0131n ve izinlerin, i\u015flerini tamamlamak i\u00e7in bunlara ihtiya\u00e7 duymayan kullan\u0131c\u0131lardan, \u00f6rne\u011fin i\u015f rollerini de\u011fi\u015ftirmi\u015f olanlardan kald\u0131r\u0131lmas\u0131na olanak tan\u0131r.<\/li><\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">IAM vs. PAM Aras\u0131ndaki Temel Farklar<\/h2>\n\n\n\n<p>IAM ve PAM aras\u0131ndaki temel fark odak noktalar\u0131d\u0131r. IAM, bir i\u015fletmenin BT altyap\u0131s\u0131 genelinde kullan\u0131c\u0131 kimliklerini ve eri\u015fim izinlerini y\u00f6netmeye odaklan\u0131rken, PAM \u00f6zellikle kritik sistemlere ve bilgilere ayr\u0131cal\u0131kl\u0131 eri\u015fimi y\u00f6netmeye ve g\u00fcvence alt\u0131na almaya odaklan\u0131r.<\/p>\n\n\n\n<p>IAM \u00e7\u00f6z\u00fcmleri, \u00e7e\u015fitli sistemler ve uygulamalar genelinde kullan\u0131c\u0131 hesaplar\u0131n\u0131, rollerini ve izinlerini y\u00f6netmek i\u00e7in tasarlanm\u0131\u015ft\u0131r. Kullan\u0131c\u0131 sa\u011flama, kimlik do\u011frulama, yetkilendirme ve eri\u015fim y\u00f6netimi gibi \u00f6zellikler sa\u011flar. \u00d6te yandan PAM \u00e7\u00f6z\u00fcmleri, ayr\u0131cal\u0131kl\u0131 eri\u015fimi y\u00f6netmek ve izlemek i\u00e7in tasarlanm\u0131\u015ft\u0131r ve yaln\u0131zca yetkili kullan\u0131c\u0131lar\u0131n kritik sistemlere ve bilgilere eri\u015fmesini sa\u011flar.<\/p>\n\n\n\n<p>IAM ve PAM aras\u0131ndaki bir di\u011fer \u00f6nemli fark da sa\u011flad\u0131klar\u0131 eri\u015fim kontrol\u00fc seviyesidir. IAM \u00e7\u00f6z\u00fcmleri, normal kullan\u0131c\u0131lar ve ayr\u0131cal\u0131kl\u0131 kullan\u0131c\u0131lar dahil olmak \u00fczere t\u00fcm kullan\u0131c\u0131lar i\u00e7in eri\u015fim izinlerini y\u00f6netmek \u00fczere tasarlanm\u0131\u015ft\u0131r. PAM \u00e7\u00f6z\u00fcmleri ise \u00f6zellikle ayr\u0131cal\u0131kl\u0131 kullan\u0131c\u0131lar i\u00e7in eri\u015fim izinlerini y\u00f6netmek \u00fczere tasarlanm\u0131\u015ft\u0131r.<\/p>\n\n\n\n<p>\u00d6zetle IAM ve PAM, i\u015fletmelerin BT altyap\u0131lar\u0131ndaki eri\u015fim kontrollerini ve izinlerini y\u00f6netmelerine yard\u0131mc\u0131 olan \u00f6nemli g\u00fcvenlik kavramlar\u0131d\u0131r. IAM, bir i\u015fletmenin BT altyap\u0131s\u0131 genelinde kullan\u0131c\u0131 kimliklerini ve eri\u015fim izinlerini y\u00f6netmeye odaklan\u0131rken, PAM \u00f6zellikle kritik sistemlere ve bilgilere ayr\u0131cal\u0131kl\u0131 eri\u015fimi y\u00f6netmeye ve g\u00fcvence alt\u0131na almaya odaklan\u0131r. Bu iki kavram aras\u0131ndaki farklar\u0131 anlayarak, i\u015fletmeler kendi \u00f6zel g\u00fcvenlik ihtiya\u00e7lar\u0131n\u0131 kar\u015f\u0131lamak i\u00e7in do\u011fru \u00e7\u00f6z\u00fcmleri se\u00e7ebilir ve eri\u015fim kontrollerini y\u00f6netmekle ili\u015fkili potansiyel riskleri ortadan kald\u0131rabilir.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Siber tehditlerin \u00e7o\u011falmas\u0131 ve BT ortamlar\u0131n\u0131n karma\u015f\u0131kl\u0131\u011f\u0131n\u0131n artmas\u0131 ile birlikte modern i\u015fletmeler, sa\u011flam Kimlik ve Eri\u015fim Y\u00f6netimi (IAM) \u00e7\u00f6z\u00fcmlerine duyulan kritik ihtiyac\u0131n fark\u0131na varmaktad\u0131r. Bu y\u00fczden IAM, kullan\u0131c\u0131 kimliklerini, dijital ayr\u0131cal\u0131klar\u0131n\u0131 ve eri\u015febilecekleri kaynaklar\u0131 y\u00f6netmek ve kontrol etmek i\u00e7in hayati bir \u00e7er\u00e7eve olarak ortaya \u00e7\u0131km\u0131\u015ft\u0131r. IAM (Identity &amp; Access Management) Nedir?&nbsp; Gartner&#8217;a g\u00f6re &#8220;Identity and [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":3880,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[86],"tags":[],"class_list":["post-3844","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-guvenlik"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>IAM (Identity &amp; Access Management) Nedir? IAM vs. PAM Aras\u0131ndaki Farklar - Uzman Posta<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/uzmanposta.com\/blog\/iam\/\" \/>\n<meta property=\"og:locale\" content=\"tr_TR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"IAM (Identity &amp; Access Management) Nedir? IAM vs. PAM Aras\u0131ndaki Farklar - Uzman Posta\" \/>\n<meta property=\"og:description\" content=\"Siber tehditlerin \u00e7o\u011falmas\u0131 ve BT ortamlar\u0131n\u0131n karma\u015f\u0131kl\u0131\u011f\u0131n\u0131n artmas\u0131 ile birlikte modern i\u015fletmeler, sa\u011flam Kimlik ve Eri\u015fim Y\u00f6netimi (IAM) \u00e7\u00f6z\u00fcmlerine duyulan kritik ihtiyac\u0131n fark\u0131na varmaktad\u0131r. Bu y\u00fczden IAM, kullan\u0131c\u0131 kimliklerini, dijital ayr\u0131cal\u0131klar\u0131n\u0131 ve eri\u015febilecekleri kaynaklar\u0131 y\u00f6netmek ve kontrol etmek i\u00e7in hayati bir \u00e7er\u00e7eve olarak ortaya \u00e7\u0131km\u0131\u015ft\u0131r. IAM (Identity &amp; Access Management) Nedir?&nbsp; Gartner&#8217;a g\u00f6re &#8220;Identity and [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/uzmanposta.com\/blog\/iam\/\" \/>\n<meta property=\"og:site_name\" content=\"Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/uzmanposta\/\" \/>\n<meta property=\"article:published_time\" content=\"2023-11-23T14:15:53+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-12-25T11:30:33+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2023\/11\/iam-identity-access-management-nedir-iam-vs-pam-arasindaki-farklar.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"500\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Sibel Ho\u015f\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@uZmanPosta\" \/>\n<meta name=\"twitter:site\" content=\"@uZmanPosta\" \/>\n<meta name=\"twitter:label1\" content=\"Yazan:\" \/>\n\t<meta name=\"twitter:data1\" content=\"Sibel Ho\u015f\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tahmini okuma s\u00fcresi\" \/>\n\t<meta name=\"twitter:data2\" content=\"12 dakika\" \/>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"IAM (Identity &amp; Access Management) Nedir? IAM vs. PAM Aras\u0131ndaki Farklar - Uzman Posta","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/uzmanposta.com\/blog\/iam\/","og_locale":"tr_TR","og_type":"article","og_title":"IAM (Identity &amp; Access Management) Nedir? IAM vs. PAM Aras\u0131ndaki Farklar - Uzman Posta","og_description":"Siber tehditlerin \u00e7o\u011falmas\u0131 ve BT ortamlar\u0131n\u0131n karma\u015f\u0131kl\u0131\u011f\u0131n\u0131n artmas\u0131 ile birlikte modern i\u015fletmeler, sa\u011flam Kimlik ve Eri\u015fim Y\u00f6netimi (IAM) \u00e7\u00f6z\u00fcmlerine duyulan kritik ihtiyac\u0131n fark\u0131na varmaktad\u0131r. Bu y\u00fczden IAM, kullan\u0131c\u0131 kimliklerini, dijital ayr\u0131cal\u0131klar\u0131n\u0131 ve eri\u015febilecekleri kaynaklar\u0131 y\u00f6netmek ve kontrol etmek i\u00e7in hayati bir \u00e7er\u00e7eve olarak ortaya \u00e7\u0131km\u0131\u015ft\u0131r. IAM (Identity &amp; Access Management) Nedir?&nbsp; Gartner&#8217;a g\u00f6re &#8220;Identity and [&hellip;]","og_url":"https:\/\/uzmanposta.com\/blog\/iam\/","og_site_name":"Blog","article_publisher":"https:\/\/www.facebook.com\/uzmanposta\/","article_published_time":"2023-11-23T14:15:53+00:00","article_modified_time":"2023-12-25T11:30:33+00:00","og_image":[{"width":1000,"height":500,"url":"https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2023\/11\/iam-identity-access-management-nedir-iam-vs-pam-arasindaki-farklar.jpeg","type":"image\/jpeg"}],"author":"Sibel Ho\u015f","twitter_card":"summary_large_image","twitter_creator":"@uZmanPosta","twitter_site":"@uZmanPosta","twitter_misc":{"Yazan:":"Sibel Ho\u015f","Tahmini okuma s\u00fcresi":"12 dakika"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/uzmanposta.com\/blog\/iam\/#article","isPartOf":{"@id":"https:\/\/uzmanposta.com\/blog\/iam\/"},"author":{"name":"Sibel Ho\u015f","@id":"https:\/\/uzmanposta.com\/blog\/#\/schema\/person\/ac85212a35ebcaaf56c92a7e051813d6"},"headline":"IAM (Identity &amp; Access Management) Nedir? IAM vs. PAM Aras\u0131ndaki Farklar","datePublished":"2023-11-23T14:15:53+00:00","dateModified":"2023-12-25T11:30:33+00:00","mainEntityOfPage":{"@id":"https:\/\/uzmanposta.com\/blog\/iam\/"},"wordCount":2721,"publisher":{"@id":"https:\/\/uzmanposta.com\/blog\/#organization"},"image":{"@id":"https:\/\/uzmanposta.com\/blog\/iam\/#primaryimage"},"thumbnailUrl":"https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2023\/11\/iam-identity-access-management-nedir-iam-vs-pam-arasindaki-farklar.jpeg","articleSection":["G\u00fcvenlik"],"inLanguage":"tr"},{"@type":"WebPage","@id":"https:\/\/uzmanposta.com\/blog\/iam\/","url":"https:\/\/uzmanposta.com\/blog\/iam\/","name":"IAM (Identity &amp; Access Management) Nedir? IAM vs. PAM Aras\u0131ndaki Farklar - Uzman Posta","isPartOf":{"@id":"https:\/\/uzmanposta.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/uzmanposta.com\/blog\/iam\/#primaryimage"},"image":{"@id":"https:\/\/uzmanposta.com\/blog\/iam\/#primaryimage"},"thumbnailUrl":"https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2023\/11\/iam-identity-access-management-nedir-iam-vs-pam-arasindaki-farklar.jpeg","datePublished":"2023-11-23T14:15:53+00:00","dateModified":"2023-12-25T11:30:33+00:00","breadcrumb":{"@id":"https:\/\/uzmanposta.com\/blog\/iam\/#breadcrumb"},"inLanguage":"tr","potentialAction":[{"@type":"ReadAction","target":["https:\/\/uzmanposta.com\/blog\/iam\/"]}]},{"@type":"ImageObject","inLanguage":"tr","@id":"https:\/\/uzmanposta.com\/blog\/iam\/#primaryimage","url":"https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2023\/11\/iam-identity-access-management-nedir-iam-vs-pam-arasindaki-farklar.jpeg","contentUrl":"https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2023\/11\/iam-identity-access-management-nedir-iam-vs-pam-arasindaki-farklar.jpeg","width":1000,"height":500,"caption":"IAM (Identity & Access Management) Nedir? IAM vs. PAM Aras\u0131ndaki Farklar"},{"@type":"BreadcrumbList","@id":"https:\/\/uzmanposta.com\/blog\/iam\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/uzmanposta.com\/blog\/"},{"@type":"ListItem","position":2,"name":"G\u00fcvenlik","item":"https:\/\/uzmanposta.com\/blog\/guvenlik\/"},{"@type":"ListItem","position":3,"name":"IAM (Identity &amp; Access Management) Nedir? IAM vs. PAM Aras\u0131ndaki Farklar"}]},{"@type":"WebSite","@id":"https:\/\/uzmanposta.com\/blog\/#website","url":"https:\/\/uzmanposta.com\/blog\/","name":"Blog","description":"","publisher":{"@id":"https:\/\/uzmanposta.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/uzmanposta.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"tr"},{"@type":"Organization","@id":"https:\/\/uzmanposta.com\/blog\/#organization","name":"Uzman Posta","url":"https:\/\/uzmanposta.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"tr","@id":"https:\/\/uzmanposta.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2020\/05\/logo.png","contentUrl":"https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2020\/05\/logo.png","width":131,"height":60,"caption":"Uzman Posta"},"image":{"@id":"https:\/\/uzmanposta.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/uzmanposta\/","https:\/\/x.com\/uZmanPosta","https:\/\/www.instagram.com\/uzmanposta\/","https:\/\/www.linkedin.com\/company\/uzmanposta\/","https:\/\/www.youtube.com\/channel\/UCk2n1vp1YJ0n3XaDRWBi88Q"]},{"@type":"Person","@id":"https:\/\/uzmanposta.com\/blog\/#\/schema\/person\/ac85212a35ebcaaf56c92a7e051813d6","name":"Sibel Ho\u015f","image":{"@type":"ImageObject","inLanguage":"tr","@id":"https:\/\/secure.gravatar.com\/avatar\/f925f03d20ff0803ddb37c96d39d3793c085014ce56421050f24823c23db1c2a?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/f925f03d20ff0803ddb37c96d39d3793c085014ce56421050f24823c23db1c2a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f925f03d20ff0803ddb37c96d39d3793c085014ce56421050f24823c23db1c2a?s=96&d=mm&r=g","caption":"Sibel Ho\u015f"},"sameAs":["https:\/\/sibelhos.com\/","https:\/\/www.instagram.com\/bismoothie\/","https:\/\/www.linkedin.com\/in\/sibelhos\/"]}]}},"_links":{"self":[{"href":"https:\/\/uzmanposta.com\/blog\/wp-json\/wp\/v2\/posts\/3844","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/uzmanposta.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/uzmanposta.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/uzmanposta.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/uzmanposta.com\/blog\/wp-json\/wp\/v2\/comments?post=3844"}],"version-history":[{"count":0,"href":"https:\/\/uzmanposta.com\/blog\/wp-json\/wp\/v2\/posts\/3844\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/uzmanposta.com\/blog\/wp-json\/wp\/v2\/media\/3880"}],"wp:attachment":[{"href":"https:\/\/uzmanposta.com\/blog\/wp-json\/wp\/v2\/media?parent=3844"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/uzmanposta.com\/blog\/wp-json\/wp\/v2\/categories?post=3844"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/uzmanposta.com\/blog\/wp-json\/wp\/v2\/tags?post=3844"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}