Zero Trust is a key paradigm for cybersecurity today, used well beyond the security circles. The goal is building cybersecurity that “never (blindly) trusts”, but “always verifies.” This traditionally meant verifying Who has access to What resource. In the past, the Who typically meant a human with a digital identity being given access to an application within an organisation. Once the individual was given access to the application, that individual would be verified via an Identity Source and authorised based on policy and permissions while logging the transaction in preparation for an audit.
Identity Governance and Administration (IGA) sits in the middle of identities and resources. IGA/IAM solutions take care of the ever-growing list of different types of Who, regardless of where the What resides. With identities on one side and resources on the other side, IAM/IGA sits in the middle handling the Identity Lifecycle Management and Access Governance to resources. Identity Lifecycle Management addresses the joiner/leaver/mover processes and the ability to provision identities, access entitlements, and other identity-related information in the target systems. Access Governance supports the auditing and ensures compliance, such as the review and disposition of user access requests, certification campaigns, and access remediation when violations are found. Access Governance also handles Segregation of Duty (SoD) controls and role and policy management capabilities.
IAM serves as the foundation for protecting sensitive information, mitigating cybersecurity risks, and streamlining operational processes. Although IAM policies, processes, and technologies can differ between companies, it is an essential part of cybersecurity for organisations of all sizes. It enables them to manage the digital identities of individuals and control their access to resources.
At its core, IAM revolves around the concepts of identity, authentication, authorisation, and accountability. Together, these can be used to mitigate cybersecurity risks by reducing or restricting user access to sensitive data.
IAM systems consist of several interconnected components that work together like a well-oiled machine to ensure secure and efficient access to resources.
IAM is a critical component of an organisation's overall security strategy. Failing to implement IAM correctly exposes organisations to these threats and vulnerabilities. In addition, addressing these threats requires a comprehensive IAM strategy that is tailored to the needs of the organisation.
Utilise Multi-factor Authentication (MFA) to strengthen the authentication process. Require users to provide multiple forms of identification, such as passwords, biometrics, or hardware tokens, to verify their identities. This reduces the risk of unauthorised access even if passwords are compromised.
Implement the principle of least privilege, granting users the minimum necessary access rights to perform their job functions. Regularly review and update access privileges to ensure they align with user roles and responsibilities. This reduces the risk of unauthorised access and limits the potential damage caused by insider threats.
Provide regular security awareness training to educate users about IAM best practices, password hygiene, and common threats like phishing and social engineering. Empowering users with knowledge helps them make informed decisions, and reduces the likelihood of falling victim to identity-related threats.
Perform regular audits and assessments of IAM infrastructure, policies, and processes. This helps identify vulnerabilities, gaps, and areas for improvement. Maintain comprehensive logs and audit trails to track user activities for forensic analysis and compliance purposes.
Consider engaging independent third-party security professionals to conduct periodic security assessments and penetration testing. This helps identify potential weaknesses in IAM systems, and provides valuable insights for remediation.
Involving the right stakeholders in the programme
Understand the risk of this programme and dependencies upfront
Acceptance of the programme at the organisational level
Initiate change management well in advance
Product selection strategy
Various testing phases
Well- defined IAM processes
Identification of crown jewels