{"id":13305,"date":"2022-11-15T10:07:25","date_gmt":"2022-11-15T09:07:25","guid":{"rendered":"https:\/\/de.nexis-secure.com\/?p=13305"},"modified":"2025-08-29T12:10:32","modified_gmt":"2025-08-29T10:10:32","slug":"sonicbee-identifying-stakeholder-access-governance-whitepaper","status":"publish","type":"post","link":"https:\/\/de.nexis-secure.com\/sonicbee-identifying-stakeholder-access-governance-whitepaper\/","title":{"rendered":"Whitepaper von SonicBee: \u201eIdentifying the stakeholders in Access Governance\u201c"},"content":{"rendered":"\n<p>Erg\u00e4nzend zu seinem Vortrag auf der <a href=\"http:\/\/www.nexis-involve.com\">INVOLVE 2022<\/a>, empfiehlt Andr\u00e9 Koot, IAM Experte der <a href=\"http:\/\/www.sonicbee.nl\/de\">SonicBee<\/a>, das Whitepaper, welches Sie im Downloadbereich herunterladen k\u00f6nnen. <\/p>\n\n\n\n<p><strong>Auszug aus dem Whitepaper:<\/strong><\/p>\n\n\n\n<p>Identit\u00e4ts- und Access Management (kurz IAM) ist ein bekanntes Thema im Bereich der Informationssicherheit. Jedoch bedeutet das nicht, dass es richtig verstanden wird. Die meisten IAM-Projekte werden als IT-Projekte definiert, die sich um die Erstellung von Benutzern in einem Onboarding-Prozess und die Entfernung derer k\u00fcmmern, wenn die Mitarbeiter das Unternehmen verlassen. Nach der Erstellung von Konten f\u00fcr Mitarbeiter und Kunden werden Berechtigungen auf der Grundlage der Rolle oder Position einer Person erteilt. Das Problem ist, dass Unternehmen die Verantwortlichkeit mehrerer relevanter Interessensgruppen vernachl\u00e4ssigen. Die falschen Personen werden f\u00fcr die Gew\u00e4hrung des Zugriffs auf Ressourcen, Systeme, Dateien und Dienste verantwortlich gemacht.&nbsp;<\/p>\n\n\n\n<p>An dieser Stelle kommt Access Governance ins Spiel. Deshalb m\u00fcssen wir erkl\u00e4ren, wer an Entscheidungen \u00fcber die Zugriffskontrolle beteiligt werden muss. Ohne die Festlegung der richtigen Verantwortlichkeiten f\u00fcr Zugriffskontrollentscheidungen hat eine Organisation nicht die Kontrolle dar\u00fcber. Das in diesem Whitepaper vorgestellte Access-Governance-Modell erm\u00f6glicht es einer Organisation, klar zu erkennen, welche Zugriffsentscheidungen getroffen wurden und wer f\u00fcr diese Entscheidungen verantwortlich ist.<\/p>\n\n\n\n<p><a href=\"https:\/\/de.nexis-secure.com\/nexis-4\/funktionen\/\">NEXIS 4<\/a> bietet als IAM Software Kontrollmechanismen, die im Whitepaper beschrieben werden, und wird von SonicBee genutzt, um Authorisations-Analysen, basierend auf den beschriebenen Prinzipien, durchzuf\u00fchren.<\/p>\n\n\n\n<p>Um das vollst\u00e4ndige Whitepaper zu lesen, laden Sie diesen bitter weiter unten herunter. Das Whitepaper ist auf Englisch geschrieben.<\/p>\n\n\n\n<p>Weitere Informationen zum Thema (auf Englisch) finden Sie hier:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>iDPro Body of Knowledge: <a href=\"https:\/\/idpro.org\/body-of-knowledge\/\">https:\/\/idpro.org\/body-of-knowledge\/<\/a><\/li>\n\n\n\n<li>Englischer Artikel zum Thema &#8220;Role owner&#8221;: <a href=\"https:\/\/idpro.org\/everybody-wants-to-be-responsible-nobody-wants-to-be-accountable\/\">https:\/\/idpro.org\/everybody-wants-to-be-responsible-nobody-wants-to-be-accountable\/<\/a><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Erg\u00e4nzend zu seinem Vortrag auf der INVOLVE 2022, empfiehlt Andr\u00e9 Koot, IAM Experte der SonicBee, das Whitepaper, welches Sie im Downloadbereich herunterladen k\u00f6nnen. Auszug aus dem Whitepaper: Identit\u00e4ts- und Access [&hellip;]<\/p>\n","protected":false},"author":15,"featured_media":27112,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"content-type":"","footnotes":""},"categories":[1],"tags":[67,38,78,77,76],"class_list":["post-13305","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-unkategorisiert","tag-access-governance","tag-iam","tag-identity-access-management-2","tag-sonicbee","tag-whitepaper"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.8 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Whitepaper von SonicBee: \u201eIdentifying the stakeholders in Access Governance\u201c - NEXIS - Enter a new level of Enterprise Authorization Governance<\/title>\n<meta name=\"description\" content=\"Erg\u00e4nzend zu dessen Vortrags zum Thema \u201eGoverning Access \u2013 Why should anyone care?\u201c auf der diesj\u00e4hrigen INVOLVE 2022, empfiehlt Andr\u00e9 Koot, IAM Experte der SonicBee, das Whitepaper \u201eIdentifying the stakeholders in Access Governance\u201c.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/de.nexis-secure.com\/de\/sonicbee-identifying-stakeholder-access-governance-whitepaper\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Whitepaper von SonicBee: \u201eIdentifying the stakeholders in Access Governance\u201c - NEXIS - Enter a new level of Enterprise Authorization Governance\" \/>\n<meta property=\"og:description\" content=\"Erg\u00e4nzend zu dessen Vortrags zum Thema \u201eGoverning Access \u2013 Why should anyone care?\u201c auf der diesj\u00e4hrigen INVOLVE 2022, empfiehlt Andr\u00e9 Koot, IAM Experte der SonicBee, das Whitepaper \u201eIdentifying the stakeholders in Access Governance\u201c.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/de.nexis-secure.com\/sonicbee-identifying-stakeholder-access-governance-whitepaper\/\" \/>\n<meta property=\"og:site_name\" content=\"NEXIS - Enter a new level of Enterprise Authorization Governance\" \/>\n<meta property=\"article:published_time\" content=\"2022-11-15T09:07:25+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-08-29T10:10:32+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/de.nexis-secure.com\/wp-content\/uploads\/sites\/4\/Blog-Default-Web-400-x-300-px-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"300\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/de.nexis-secure.com\/sonicbee-identifying-stakeholder-access-governance-whitepaper\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/de.nexis-secure.com\/sonicbee-identifying-stakeholder-access-governance-whitepaper\/\"},\"author\":{\"name\":\"\",\"@id\":\"\"},\"headline\":\"Whitepaper von SonicBee: \u201eIdentifying the stakeholders in Access Governance\u201c\",\"datePublished\":\"2022-11-15T09:07:25+00:00\",\"dateModified\":\"2025-08-29T10:10:32+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/de.nexis-secure.com\/sonicbee-identifying-stakeholder-access-governance-whitepaper\/\"},\"wordCount\":282,\"publisher\":{\"@id\":\"https:\/\/de.nexis-secure.com\/de\/#organization\"},\"image\":{\"@id\":\"https:\/\/de.nexis-secure.com\/sonicbee-identifying-stakeholder-access-governance-whitepaper\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/de.nexis-secure.com\/wp-content\/uploads\/sites\/4\/Blog-Default-Web-400-x-300-px-1.png\",\"keywords\":[\"Access Governance\",\"IAM\",\"identity access management\",\"sonicbee\",\"whitepaper\"],\"articleSection\":[\"Unkategorisiert\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/de.nexis-secure.com\/sonicbee-identifying-stakeholder-access-governance-whitepaper\/\",\"url\":\"https:\/\/de.nexis-secure.com\/sonicbee-identifying-stakeholder-access-governance-whitepaper\/\",\"name\":\"Whitepaper von SonicBee: \u201eIdentifying the stakeholders in Access Governance\u201c - NEXIS - Enter a new level of Enterprise Authorization Governance\",\"isPartOf\":{\"@id\":\"https:\/\/de.nexis-secure.com\/de\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/de.nexis-secure.com\/sonicbee-identifying-stakeholder-access-governance-whitepaper\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/de.nexis-secure.com\/sonicbee-identifying-stakeholder-access-governance-whitepaper\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/de.nexis-secure.com\/wp-content\/uploads\/sites\/4\/Blog-Default-Web-400-x-300-px-1.png\",\"datePublished\":\"2022-11-15T09:07:25+00:00\",\"dateModified\":\"2025-08-29T10:10:32+00:00\",\"description\":\"Erg\u00e4nzend zu dessen Vortrags zum Thema \u201eGoverning Access \u2013 Why should anyone care?\u201c auf der diesj\u00e4hrigen INVOLVE 2022, empfiehlt Andr\u00e9 Koot, IAM Experte der SonicBee, das Whitepaper \u201eIdentifying the stakeholders in Access Governance\u201c.\",\"breadcrumb\":{\"@id\":\"https:\/\/de.nexis-secure.com\/sonicbee-identifying-stakeholder-access-governance-whitepaper\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/de.nexis-secure.com\/sonicbee-identifying-stakeholder-access-governance-whitepaper\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/de.nexis-secure.com\/sonicbee-identifying-stakeholder-access-governance-whitepaper\/#primaryimage\",\"url\":\"https:\/\/de.nexis-secure.com\/wp-content\/uploads\/sites\/4\/Blog-Default-Web-400-x-300-px-1.png\",\"contentUrl\":\"https:\/\/de.nexis-secure.com\/wp-content\/uploads\/sites\/4\/Blog-Default-Web-400-x-300-px-1.png\",\"width\":400,\"height\":300},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/de.nexis-secure.com\/sonicbee-identifying-stakeholder-access-governance-whitepaper\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\/\/de.nexis-secure.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Whitepaper von SonicBee: \u201eIdentifying the stakeholders in Access Governance\u201c\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/de.nexis-secure.com\/de\/#website\",\"url\":\"https:\/\/de.nexis-secure.com\/de\/\",\"name\":\"NEXIS - Enter a new level of Enterprise Authorization Governance\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/de.nexis-secure.com\/de\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/de.nexis-secure.com\/de\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/de.nexis-secure.com\/de\/#organization\",\"name\":\"NEXIS - Enter a new level of Enterprise Authorization Governance\",\"url\":\"https:\/\/de.nexis-secure.com\/de\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/de.nexis-secure.com\/de\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/de.nexis-secure.com\/wp-content\/uploads\/sites\/4\/2021_NEXIS_Logo.svg\",\"contentUrl\":\"https:\/\/de.nexis-secure.com\/wp-content\/uploads\/sites\/4\/2021_NEXIS_Logo.svg\",\"width\":2820,\"height\":622,\"caption\":\"NEXIS - Enter a new level of Enterprise Authorization Governance\"},\"image\":{\"@id\":\"https:\/\/de.nexis-secure.com\/de\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"\",\"url\":\"https:\/\/de.nexis-secure.com\/de\/author\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Whitepaper von SonicBee: \u201eIdentifying the stakeholders in Access Governance\u201c - NEXIS - Enter a new level of Enterprise Authorization Governance","description":"Erg\u00e4nzend zu dessen Vortrags zum Thema \u201eGoverning Access \u2013 Why should anyone care?\u201c auf der diesj\u00e4hrigen INVOLVE 2022, empfiehlt Andr\u00e9 Koot, IAM Experte der SonicBee, das Whitepaper \u201eIdentifying the stakeholders in Access Governance\u201c.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/de.nexis-secure.com\/de\/sonicbee-identifying-stakeholder-access-governance-whitepaper\/","og_locale":"en_US","og_type":"article","og_title":"Whitepaper von SonicBee: \u201eIdentifying the stakeholders in Access Governance\u201c - NEXIS - Enter a new level of Enterprise Authorization Governance","og_description":"Erg\u00e4nzend zu dessen Vortrags zum Thema \u201eGoverning Access \u2013 Why should anyone care?\u201c auf der diesj\u00e4hrigen INVOLVE 2022, empfiehlt Andr\u00e9 Koot, IAM Experte der SonicBee, das Whitepaper \u201eIdentifying the stakeholders in Access Governance\u201c.","og_url":"https:\/\/de.nexis-secure.com\/sonicbee-identifying-stakeholder-access-governance-whitepaper\/","og_site_name":"NEXIS - Enter a new level of Enterprise Authorization Governance","article_published_time":"2022-11-15T09:07:25+00:00","article_modified_time":"2025-08-29T10:10:32+00:00","og_image":[{"width":400,"height":300,"url":"https:\/\/de.nexis-secure.com\/wp-content\/uploads\/sites\/4\/Blog-Default-Web-400-x-300-px-1.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/de.nexis-secure.com\/sonicbee-identifying-stakeholder-access-governance-whitepaper\/#article","isPartOf":{"@id":"https:\/\/de.nexis-secure.com\/sonicbee-identifying-stakeholder-access-governance-whitepaper\/"},"author":{"name":"","@id":""},"headline":"Whitepaper von SonicBee: \u201eIdentifying the stakeholders in Access Governance\u201c","datePublished":"2022-11-15T09:07:25+00:00","dateModified":"2025-08-29T10:10:32+00:00","mainEntityOfPage":{"@id":"https:\/\/de.nexis-secure.com\/sonicbee-identifying-stakeholder-access-governance-whitepaper\/"},"wordCount":282,"publisher":{"@id":"https:\/\/de.nexis-secure.com\/de\/#organization"},"image":{"@id":"https:\/\/de.nexis-secure.com\/sonicbee-identifying-stakeholder-access-governance-whitepaper\/#primaryimage"},"thumbnailUrl":"https:\/\/de.nexis-secure.com\/wp-content\/uploads\/sites\/4\/Blog-Default-Web-400-x-300-px-1.png","keywords":["Access Governance","IAM","identity access management","sonicbee","whitepaper"],"articleSection":["Unkategorisiert"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/de.nexis-secure.com\/sonicbee-identifying-stakeholder-access-governance-whitepaper\/","url":"https:\/\/de.nexis-secure.com\/sonicbee-identifying-stakeholder-access-governance-whitepaper\/","name":"Whitepaper von SonicBee: \u201eIdentifying the stakeholders in Access Governance\u201c - NEXIS - Enter a new level of Enterprise Authorization Governance","isPartOf":{"@id":"https:\/\/de.nexis-secure.com\/de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/de.nexis-secure.com\/sonicbee-identifying-stakeholder-access-governance-whitepaper\/#primaryimage"},"image":{"@id":"https:\/\/de.nexis-secure.com\/sonicbee-identifying-stakeholder-access-governance-whitepaper\/#primaryimage"},"thumbnailUrl":"https:\/\/de.nexis-secure.com\/wp-content\/uploads\/sites\/4\/Blog-Default-Web-400-x-300-px-1.png","datePublished":"2022-11-15T09:07:25+00:00","dateModified":"2025-08-29T10:10:32+00:00","description":"Erg\u00e4nzend zu dessen Vortrags zum Thema \u201eGoverning Access \u2013 Why should anyone care?\u201c auf der diesj\u00e4hrigen INVOLVE 2022, empfiehlt Andr\u00e9 Koot, IAM Experte der SonicBee, das Whitepaper \u201eIdentifying the stakeholders in Access Governance\u201c.","breadcrumb":{"@id":"https:\/\/de.nexis-secure.com\/sonicbee-identifying-stakeholder-access-governance-whitepaper\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/de.nexis-secure.com\/sonicbee-identifying-stakeholder-access-governance-whitepaper\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/de.nexis-secure.com\/sonicbee-identifying-stakeholder-access-governance-whitepaper\/#primaryimage","url":"https:\/\/de.nexis-secure.com\/wp-content\/uploads\/sites\/4\/Blog-Default-Web-400-x-300-px-1.png","contentUrl":"https:\/\/de.nexis-secure.com\/wp-content\/uploads\/sites\/4\/Blog-Default-Web-400-x-300-px-1.png","width":400,"height":300},{"@type":"BreadcrumbList","@id":"https:\/\/de.nexis-secure.com\/sonicbee-identifying-stakeholder-access-governance-whitepaper\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/de.nexis-secure.com\/"},{"@type":"ListItem","position":2,"name":"Whitepaper von SonicBee: \u201eIdentifying the stakeholders in Access Governance\u201c"}]},{"@type":"WebSite","@id":"https:\/\/de.nexis-secure.com\/de\/#website","url":"https:\/\/de.nexis-secure.com\/de\/","name":"NEXIS - Enter a new level of Enterprise Authorization Governance","description":"","publisher":{"@id":"https:\/\/de.nexis-secure.com\/de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/de.nexis-secure.com\/de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/de.nexis-secure.com\/de\/#organization","name":"NEXIS - Enter a new level of Enterprise Authorization Governance","url":"https:\/\/de.nexis-secure.com\/de\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/de.nexis-secure.com\/de\/#\/schema\/logo\/image\/","url":"https:\/\/de.nexis-secure.com\/wp-content\/uploads\/sites\/4\/2021_NEXIS_Logo.svg","contentUrl":"https:\/\/de.nexis-secure.com\/wp-content\/uploads\/sites\/4\/2021_NEXIS_Logo.svg","width":2820,"height":622,"caption":"NEXIS - Enter a new level of Enterprise Authorization Governance"},"image":{"@id":"https:\/\/de.nexis-secure.com\/de\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"","url":"https:\/\/de.nexis-secure.com\/de\/author\/"}]}},"_links":{"self":[{"href":"https:\/\/de.nexis-secure.com\/de\/wp-json\/wp\/v2\/posts\/13305","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/de.nexis-secure.com\/de\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/de.nexis-secure.com\/de\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/de.nexis-secure.com\/de\/wp-json\/wp\/v2\/users\/15"}],"replies":[{"embeddable":true,"href":"https:\/\/de.nexis-secure.com\/de\/wp-json\/wp\/v2\/comments?post=13305"}],"version-history":[{"count":1,"href":"https:\/\/de.nexis-secure.com\/de\/wp-json\/wp\/v2\/posts\/13305\/revisions"}],"predecessor-version":[{"id":27417,"href":"https:\/\/de.nexis-secure.com\/de\/wp-json\/wp\/v2\/posts\/13305\/revisions\/27417"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/de.nexis-secure.com\/de\/wp-json\/wp\/v2\/media\/27112"}],"wp:attachment":[{"href":"https:\/\/de.nexis-secure.com\/de\/wp-json\/wp\/v2\/media?parent=13305"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/de.nexis-secure.com\/de\/wp-json\/wp\/v2\/categories?post=13305"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/de.nexis-secure.com\/de\/wp-json\/wp\/v2\/tags?post=13305"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}