Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Cybersecurity
    • Cybersecurity

    How to Implement a Solid Identity and Access Management Strategy

    By
    Chris Preimesberger
    -
    September 6, 2017
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      PrevNext

      1How to Implement a Solid Identity and Access Management Strategy

      1 - How to Implement a Solid Identity and Access Management Strategy

      Most enterprises select and implement technology to perform tasks better, deliver higher value to users, fulfill their business mission and become more agile as an organization. But it often happens that many IT initiatives, including identity and access management (IAM), deter new technology initiatives and hamstring a company’s IT agility. This is largely because IAM can appear to be an unwelcome process for employees to learn. In this eWEEK slide show, One Identity Product Marketing Manager Todd Peterson explains 11 universal truths of IAM that provide common-sense guidance on how to implement a solid IAM strategy—without impeding business agility.

      2Security Is a Journey, Not a Destination

      2 - Security Is a Journey, Not a Destination

      Security often is addressed on a point-by-point basis, such as “I need to secure system X” or “I need to prevent threat Y.” Anyone who attempts to deal with security in that piecemeal manner will find himself in a losing battle, constantly running from one fire to the next. It’s important to approach security (IAM being a major subset of that) with a unified strategy: a single set of controlling policies that apply to all systems; a single user identity; a single set of parameters that control access; and a single point of management.

      3You Can’t Fix Problems You Can’t See

      3 - You Can't Fix Problems You Can't See

      A direct result of the complexity inherent in today’s IAM landscape is the extremely broad range of things that can break or be exploited. With any single user having many dozens of individual identities across just as many systems (and with each system requiring different attributes or controls), it quickly becomes obvious that there are too many disparate factors to handle. Simply understanding everything a user can access, not to mention what the user does with that access, becomes impossible. Therefore, it’s important to implement IAM in a way the exposes not only identity but also authorization. That way you can see and resolve the danger before it becomes an issue.

      4Administrators Are Helpful People, but That’s Also the Problem

      4 - Administrators Are Helpful People, but That's Also the Problem

      We all have that guy in IT who just gets things done. When red tape stands in the way of getting access to something you need to do your job, calling this IT superhero can result in receiving exactly what you need. But there’s a security problem associated with relying on the helpful IT guy; not every employee is trustworthy and may be requesting access they shouldn’t have.

      5Automating Controls Can Be the Answer

      5 - Automating Controls Can Be the Answer

      The most secure way to deal with access requests and fulfillment is to automate the controls around decision-making and ultimately fulfillment. For example, user requests for access are automatically checked against an established security policy, without requiring IT intervention (and while tracking the entire transaction). Users are granted the access they need—and should have—but in a way that won’t cause trouble during audits.

      6Unlike You, the Bad Guys Have Nothing Better to Do

      6 - Unlike You, the Bad Guys Have Nothing Better to Do

      Hackers want to get to your organization’s crown jewels—the data that is the lifeblood of everything you do. They have lots of time and creativity and enjoy the hunt almost as much as the kill. You, on the other hand, have a job to do, and it probably doesn’t involve watching every user and entry point for suspicious activity. But the bad guys will always aim for the easiest targets; they will continue to look to exploit weaknesses in your systems and users’ behavior.

      7Users Will Write Down Passwords but Won’t Remember Them

      7 - Users Will Write Down Passwords but Won't Remember Them

      We have many passwords to remember in spite of our best efforts to use the same strong one everywhere. So what do we do? We write them all down and store them in a drawer, on a sticky note under the keyboard or in a note called “passwords” on our phones. The dangers are clear: Regardless of how appropriately provisioned a user is, how thoroughly you monitor and how strong your security policy is, all bets are off if a password falls into the wrong hands.

      8Insider Threats Are the Biggest Risk to Your Organization

      8 - Insider Threats Are the Biggest Risk to Your Organization

      Many of the most damaging and high-profile security breaches of recent years were the result of insiders using privileged access to do bad things. Some steal and publicize critical data. Others set time bombs to destroy systems. The common theme is that someone in a trusted position was given privileged access and abused it. The echoes of “I trust my staff, they would never intentionally hurt the company” are still bouncing off the walls of these organizations.

      9Sending Workflow to a Cloud Doesn’t Magically Make It Easier to Secure

      9 - Sending Workflow to a Cloud Doesn't Magically Make It Easier to Secure

      Just because something is in the cloud doesn’t lessen the need for the same security concerns that are the bedrock of on-premises IAM. In fact, many of the critical aspects of good IAM—specifically unified, business-driven and policy-based workflows—become even more critical when they move out of your direct control. When the controlling aspects of IAM can be unified, automated and controlled by the business rather than IT, the specifics of deployment—whether on premises or in the cloud—become much more manageable.

      10If You Defined Your IAM Project More than Six Months Ago, It’s Probably Out of Date

      10 - If You Defined Your IAM Project More than Six Months Ago, It's Probably Out of Date

      IAM is a moving target. It’s not uncommon for organizations to talk about how they are on the fifth year of their three-year IAM plan and are nowhere close to achieving their original objectives. IAM projects often rely on highly customized solutions purpose-built for the specific makeup of an organization. But the problem is that when those things are defined in year zero, the solution planned for year three and delivered in year five is nowhere close to the actual requirements of the present.

      11It’s Difficult to Get Executives to Use More Than One Tool

      11 - It's Difficult to Get Executives to Use More Than One Tool

      The harsh reality is that the success (or lack thereof) of any IAM project is tied to the enthusiasm of the executives who are paying for it—and that enthusiasm is going to be directly dampened by complexity. When duplicate activities must be performed on different systems, using different tools and often with heavy IT involvement, that results in headache-inducing complexity—and decreased desire to involve IAM and IT in projects.

      12Efficiency vs. Security: Connecting Those Dots Is Not Easy

      12 - Efficiency vs. Security: Connecting Those Dots Is Not Easy

      It is very difficult to satisfy both efficiency and security, and that difficulty is directly proportional to the complexity of your environment. It’s a constant battle: “Do you want me to be secure or do you want me to be efficient?” Of course, the answer is both, but the truth is complexity puts security and operational efficiency at odds. To have both, IAM and IT professionals need to reduce complexity—this can be done by unifying and automating.

      PrevNext

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×