Back to Glossary

Cybersecurity & Risk

Identity and Access Management (IAM)

Identity and Access Management (IAM) is a cybersecurity framework and set of business processes that manages digital identities and controls user access to critical organizational resources.

Context for Technology Leaders

For CIOs and Enterprise Architects, IAM is fundamental to establishing a robust security posture, enabling compliance with regulations like GDPR and HIPAA, and supporting Zero Trust architectures. It ensures the right individuals and entities have appropriate access, mitigating risks associated with unauthorized data exposure and system breaches, while streamlining operational efficiency across complex IT environments.

Key Principles

  • 1Centralized Identity Management: Consolidate user identities across diverse systems for consistent provisioning and deprovisioning, enhancing security and reducing administrative overhead.
  • 2Least Privilege Access: Grant users only the minimum access rights necessary to perform their job functions, significantly reducing the attack surface and potential impact of a breach.
  • 3Multi-Factor Authentication (MFA): Implement multiple verification methods to confirm user identity, adding a crucial layer of security beyond traditional passwords and protecting against credential theft.
  • 4Access Governance and Auditing: Establish policies, processes, and tools to regularly review, certify, and audit user access, ensuring compliance and detecting anomalous behavior.

Related Terms

Zero Trust ArchitectureMulti-Factor Authentication (MFA)Access ControlPrivileged Access Management (PAM)Single Sign-On (SSO)Governance, Risk, and Compliance (GRC)