Week 19: An Introduction to IAM
Downloaded from Pixabay

Week 19: An Introduction to IAM

Before we delve into the definition and benefits of IAM, it's important to understand the difference between identification, authentication, and authorization

The first involves the user “identifying” himself/ herself. This could be through a username, telephone number, or even an email address. Essentially, in this first step, the user is claiming to be someone. 

Authentication, on the other hand, is all about verifying whether that person is indeed who they claim to be. This can be done through one of the following factors: something they know (for example, a password), something they have (like a smart card) and/ or something they are (such as a fingerprint). The combination of more than one factor is known as Multi-factor authentication (MFA). 

Finally, in authorization, the level of permission the authenticated user has is determined. This means that the system will check whether User X has the privilege to access some or all of the resources.

Figure 1: How Authentication and Authorization Work (Source:

In essence, this is what Identity and Access Management (IAM) is all about. It’s a combination of policies, procedures, and technologies that ensures the right users (i.e., individuals or machines) have access to the different resources (like, email or databases) for the right reasons at the right time. 

Factoring in IAM can help organizations:

  • Achieve compliance: These can include Sarbanes-Oxley (SOX), Gramm-Leach-Bliley Act (GBLA), Health Insurance Portability and Accountability Act (HIPAA), Payment Card Industry Data Security Standard (PCI DSS) and General Data Protection Regulation (GDPR).
  • Boost productivity: IAM tools can help develop automated workflows for joiners, movers, and leavers, thus helping businesses to reduce overheads. 
  • Better manage passwords: 80% of breaches are caused by passwords. IAM solutions can help enforce best practices and even reduce their use through Single sign-on (SSO).
  • Mitigate Insider Threat: This can be achieved by implementing MFA, the use of approaches like Role-based access control (RBAC) to assign roles and responsibilities, the concept of least privilege, as well as facilitating monitoring and auditing. 
  • Obtain the goal of zero trust: Please refer to the video below.

So what are some of the common components of IAM?

Figure 2: Usual IAM offerings (Source:

  • SSO: The idea behind this is that the user fulfills the requirement of entering his/ her password and/ or completing the MFA challenge once. The system then proceeds to authenticate and authorize the individual, after which he/ she will not prompted to enter their credentials again. A well-known example of its implementation is Google. Once you’ve logged into Gmail, there’s no need of introducing a password to use YouTube or any of the other apps. The benefits of SSO can range from reduced IT costs to increased productivity. 
  • Multi-factor authentication.
  • Analytics and risk-based authentication: Here the IAM system leverages artificial intelligence (AI) to assess suspicious activity. During login, factors such as device (i.e., Is this mobile known?), location (i.e., Is this the usual timezone?), network (i.e., Is this a familiar IP?), and the sensitivity of the resource that needs to be accessed (i.e., Is the file sensitive or classified as unrestricted?) are analyzed. If the result is deemed as high risk, the user will almost certainly be required to authenticate using an additional factor. 
  • Zero Trust.
  • RBAC: As mentioned earlier, RBAC is one of the approaches to controlling access based on the individual’s role within the organization. This means users can be grouped depending on their seniority or job description. Users within the same group (for instance, finance) will have the same rights and responsibilities. RBAC isn’t perfect, it has disadvantages. For instance, not everyone has a clear-cut responsibility, which means IT admins might struggle to assign people specific roles. Another challenge involves flexibility. User X from Employee Relations might be required to support Payroll for a few days. Managing permissions in such cases can be a hassle. 

(Note: Other alternatives to RBAC include Attribute-Based Access Control (ABAC), Mandatory Access Control (MAC), and Discretionary Access Control (DAC), but none of them is a perfect solution. In some cases, they can be complemented.) 

Next week we’ll explore the different information security standards.

This article is part of a project called Security Chronicles, written jointly with Walter Buyu .

Sources:



To view or add a comment, sign in

More articles by Puneet Tanwani Manghnani

  • Week 51: Getting Buy-In from Management

    Week 51: Getting Buy-In from Management

    If you work in cybersecurity, there are some hard facts that we all have to learn, for example: Changing bad habits is…

  • Week 49: Identity Theft

    Week 49: Identity Theft

    This week we’ll address the nefariously famous act of identity theft, that has expanded thanks to the proliferation and…

  • Week 47: Let’s understand data classification and categorization

    Week 47: Let’s understand data classification and categorization

    Fortunately, this week’s article isn’t going to be as technically intense as the past few weeks. However, understanding…

  • Week 44: Cybersecurity Metrics

    Week 44: Cybersecurity Metrics

    In the last 43 weeks, we’ve covered the theory behind topics like, but not limited to, Risk Management, Incident…

  • Week 42: An Introduction to Cyber Threat Intelligence

    Week 42: An Introduction to Cyber Threat Intelligence

    Today’s topic is quite relevant. We aren’t quite sure why we didn’t address this in Q1, but… better late than never.

  • Week 40: PCI DSS

    Week 40: PCI DSS

    In the last two weeks, we’ve looked at ISO 27001 as well as the CIS Controls. Today we’ll focus on the Payment Card…

    1 Comment
  • Week 38: ISO 27001

    Week 38: ISO 27001

    Last week, Walter Buyu mentioned that the next few articles will deal with standards… and we’ll start with ISO 27001…

  • Week 36: VPN vs. Tor

    Week 36: VPN vs. Tor

    Walter Buyu and I addressed the basics of cryptography in Week 16. Last week (i.

  • Week 34: Vulnerability Assessment and Penetration Testing

    Week 34: Vulnerability Assessment and Penetration Testing

    This week’s article is around two types of security testing that should be part of your cybersecurity strategy –…

  • Week 31: The RACI Matrix

    Week 31: The RACI Matrix

    In the course of writing these weekly articles, Walter Buyu and I have briefly mentioned, a few times, the need to have…

Insights from the community

Others also viewed

Explore topics