Identity and Access Management
Identity and Access Management
Identity and Access Management
▪ IAM addresses the important need to make sure that appropriate access to
resources across increasingly mixed technology environments and to meet
increasingly difficult regulation requirements. It is very deeply related to business,
and it requires business skills, not just technical expertise.
▪ Identity management and access systems help organizations to manage their
employee apps without logging into each app as an administrator.It helps
organizations to manage a range of identities including people, hardware,software,
and IoT devices.
CSPIT-CE,CHARUSAT 1
19CE006,19CE016,19CE020 IDENTITY AND ACCESS MANAGEMENT
• IAM systems sole criteria for creation was to create, manage , and delete users
along with integrating them with different user directory and to synchronize
them .It can also create with specialized access to the certain tools of the
organization.
• Authentication
• IAM systems authenticate a user by verifying that they are the same person who
they say they are. Nowadays, secure authentication means multi-factor
authentication (MFA) and, preferably, adaptive authentication.
CSPIT-CE,CHARUSAT 2
19CE006,19CE016,19CE020 IDENTITY AND ACCESS MANAGEMENT
• Authorizing users
• Access management makes sure that a user is granted the exact level and type of
access to a tool that they're assigned to by the organization. Users can also be
combined or separated into groups or roles so large groups of users can be granted
the same privileges.
• Deprovisioning refers to taking away a user's access to various SAAS apps and
network systems at the same time. When an employee leaves a firm or changes
position within the organization, the Deprovisioning action is called upon.
Deprovisioning lets organizations to free up disc space, ports, certificates, and
company-issued workstations for future usage by removing users accounts from file
servers and authentication servers like Active Directory. Deprovisioning helps in
CSPIT-CE,CHARUSAT 3
19CE006,19CE016,19CE020 IDENTITY AND ACCESS MANAGEMENT
• Single Sign On
• Identity and access management solutions with single sign-on (SSO) allow users
to verify their identity at one portal instead of many different resources. Once
verified, the IAM system acts as the source of identity truth for the other
resources available to the user, thus removing the need for the user to
remember several passwords.
CSPIT-CE,CHARUSAT 4
19CE006,19CE016,19CE020 IDENTITY AND ACCESS MANAGEMENT
CSPIT-CE,CHARUSAT 5
19CE006,19CE016,19CE020 IDENTITY AND ACCESS MANAGEMENT
gaits, voices ,faces, and, in some cases, DNA. Biometrics and behaviour-based
analytics have been found to be more effective than passwords.
IAM Risks
▪ IAM also comes with its own risks, which includes IAM configuration oversights.
Expert outlined five oversights that should be avoided, including incomplete
provisioning, poor process automation and insufficient reviews. One should follow
principle of least privilege is essential to ensuring proper security.
▪ Biometrics, as discussed earlier, also poses security challenges, including data theft.
Collecting and storing only data that is necessary lessens that risk. Organizations
should know what biometric data they have, how and where data is stored ,what
they need, how to get rid of what they don't require.
▪ Cloud-based IAM can be of concern when the provisioning and deprovisioning of
accounts in an organizations aren't handled correctly, if there are too many
vulnerable inactive assigned user accounts. Organizations need to make lifecycle
control over every aspects of cloud-based IAM to prevent malicious people from
gaining access to user identities and passwords.
▪ Features like multifactor authentication can be more easily deployed in a cloud-
based environment than they would be on premises because of their complexity.
CSPIT-CE,CHARUSAT 6
19CE006,19CE016,19CE020 IDENTITY AND ACCESS MANAGEMENT
▪ Audit capabilities act as a check to make sure that when users switch roles or leave
the organization, their access changes accordingly.
▪ Self-sovereign identity.
▪ This idea is the premise behind self-sovereign identity, an emerging concept
that could change how identity management works.
▪ Self-sovereign identity (SSI) is a set of technologies and tools that eliminates
the need for organizations to store users’ identity data. It is decentralizing
identity creation, attestation and verification—and as founders of the idea
say—is the future of secure, user-controlled identity management. While
implementation is far away, several industry leaders, as well as financial
institutions, are working on practical applications. Various aspects need to be
addressed before it is adopted by all, including the development of universal
standards and an interoperable ecosystem.
CSPIT-CE,CHARUSAT 7
19CE006,19CE016,19CE020 IDENTITY AND ACCESS MANAGEMENT
CSPIT-CE,CHARUSAT 8
19CE006,19CE016,19CE020 IDENTITY AND ACCESS MANAGEMENT
CSPIT-CE,CHARUSAT 9
19CE006,19CE016,19CE020 IDENTITY AND ACCESS MANAGEMENT
credential can open the door for vulnerability and a malicious former employee can
access the company’s network and steal confidential data.
▪ Through the use of Self-Sovereign Identity the user would be onboarded on all the
different services using his own credentials or one created by the company. The
employee would then store the credentials on his identity wallet. On the moment of
revocation, only one credential of the identity wallet would have to be revoked to
cut access to all of the accounts.
▪ By strengthening the audit trail, Self-Sovereign Identity could be an innovation in the
Identity and Access Management area. These enterprise softwares keep track of user
access for fraud protection and compliance concerns. Though the way by which that
log is created – sometimes a text file – is concerning since privileged people could
alter or remove logs for malicious purposes. Because of its immutability, blockchain
could be a good fit for access log security.
CSPIT-CE,CHARUSAT 10