Identity & Access Management (IAM)

Identity & Access Management (IAM)
  • IAM: Framework of technologies, policies, and processes to ensure the right people/systems have proper access at the right time.
  • Core Components: Identity management, authentication, authorization, SSO, MFA, PAM, audit & compliance.
  • Identity Management: Creates, stores, and manages digital identities; covers provisioning, de-provisioning, and lifecycle management.
  • Authentication: Verifies identity via passwords, MFA, biometrics, or single sign-on.
  • Authorization (Access Control): Determines resource access using RBAC, ABAC, or PBAC models.
  • Privileged Access Management (PAM): Restricts and monitors high-level accounts (admins, root users).
  • Benefits: Improves security, enhances user experience, ensures regulatory compliance, increases operational efficiency, enables Zero Trust.
  • Use Cases: Controlling cloud app access, MFA for remote workers, automated onboarding/offboarding, limiting vendor access, securing privileged accounts.
  • Leading Solutions: Okta, Microsoft Entra ID (Azure AD), Ping Identity, IBM Security Verify, CyberArk, Duo Security, ForgeRock.
  • IAM in Security Stack: First line of defense; integrates with DLP, EDR/NDR, SIEM/SOAR to prevent unauthorized access and detect threats.