Acceleration Economy
  • Home
  • Cloud Wars
  • Analyst Content
    • By Category
      • AI/Hyperautomation
      • Cloud/Cloud Wars
      • Cybersecurity
      • Data
    • By Interest
      • Leadership
      • Office of the CFO
      • Partners Ecosystem
      • Sustainability
    • By Industry
      • Financial Services
      • Healthcare
      • Manufacturing
      • Retail
    • By Type
      • Guidebooks
      • Digital Summits
      • Practitioner Roundtables
      • Practitioner Playlists
    • By Language
      • Español
  • Vendor Shortlists
    • All Vendors
    • AI/Hyperautomation
    • Cloud
    • Cybersecurity
    • Data
  • What we do
    • Advisory Services
    • Marketing Services
    • Event Services
  • Who we are
    • About Us
    • Practitioner Analysts
  • Subscribe
Twitter Instagram
  • CIO Summit
  • Summit NA
  • Dynamics Communities
Twitter LinkedIn
Acceleration Economy
  • Home
  • Cloud Wars
  • Analyst Content
        • By Category
          • AI/Hyperautomation
          • Cloud/Cloud Wars
          • CybersecurityThe practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks.
          • Data
        • By Interest
          • Leadership
          • Office of the CFO
          • Partners Ecosystem
          • Sustainability
        • By Industry
          • Financial Services
          • Healthcare
          • Manufacturing
          • Retail
        • By Type
          • Guidebooks
          • Digital Summits
          • Practitioner Roundtables
          • Practitioner Playlists
        • By Language
          • Español
  • Vendor Shortlists
    • All Vendors
    • AI/Hyperautomation
    • Cloud
    • Cybersecurity
    • Data
  • What we do
    • Advisory Services
    • Marketing Services
    • Event Services
  • Who we are
    • About Us
    • Practitioner Analysts
  • Subscribe
    • Login / Register
Acceleration Economy
    • Login / Register
Home » How to Simplify Identity and Access Management (IAM) to Maximize Security
Cybersecurity as a Business Enabler

How to Simplify Identity and Access Management (IAM) to Maximize Security

Chris HughesBy Chris HughesOctober 12, 2022Updated:December 28, 20223 Mins Read
Facebook Twitter LinkedIn Email
simplify IAM sprawl security
Share
Facebook Twitter LinkedIn Email
Acceleration Economy Cybersecurity

Anyone who has worked in a large-enterprise environment likely has had to manage several accounts, logins, passwords, and multifactor authentication methods. This is due to having to authenticate into various systems and tools across the enterprise environment. This identity and access management (IAM) sprawl causes security and information technology (IT) professionals a lot of headaches.

A recent Axiad survey, involving more than 200 professionals in organizations of more than 2,500 employees, found that nearly 70 percent of security and IT professionals are overwhelmed by authentication system complexity. Some of the survey’s findings highlight the complexity of the modern-enterprise environment when it comes to authentication. These findings include professionals having to use three or more IAM systems, multiple operating systems, three or more authentication methods, and so forth. As one can guess, the complexity of managing these systems, with all those credentials and authentication methods, quickly piles up.

The Cause of IAM Sprawl

Some IAM sprawl is a natural byproduct of the ever-increasing complexity of the modern-enterprise IT environment. This byproduct comes with its own inherent risks and concerns. Notable sources such as the Verizon Data Breach Investigation Report (DBIR) show that compromised credentials are involved in more than half of all data breaches. In the cloud environment, vendors such as GitGuardian have shown that secrets management is a major challenge, with organizations often exposing sensitive credentials unintentionally in sources such as GitHub repositories. So, not only is IAM complex for IT and security professionals, and therefore likely impeding their productivity and performance, but it is also contributing to the risk of the organization and the likelihood of a damaging data breach.

Steps to Alleviate IAM Sprawl

Organizations need to realize the risk of IAM sprawl in terms of productivity as well as potential data breaches and sensitive data disclosure. That said, the news isn’t all bad. There are steps organizations can take to bolster posture against the risk and improve their organization compared to others in the industry on the IAM front.

Some of the primary options include rationalizing IAM systems and consolidating identity providers (IdPs). Many organizations have several IAM systems that store credentials and often don’t communicate well with one another, leading to sprawl. Consolidating IAM systems can help organizations govern their IAM footprint. Organizations should also maximize the use of single sign-on (SSO), which can save practitioners tremendous time since it allows them to no longer need a unique credential for every system they interact with.

Another emerging trend is the move toward passwordless authentication. Traditionally, users needed to memorize passwords for the various systems with which they interact. That was alleviated to some extent with the emergence of password managers, which can help with the generation and use of passwords, but passwordless authentication hopes to go beyond that and try to minimize the use of passwords entirely, instead using other forms of authentication.

Final Thoughts

Driving down the IAM environment’s complexity should be a major priority for all organizations, especially given the common problem of attracting and retaining technical talent. Failing to adopt all, or at least some, of these recommendations will continue to lead to the problems that plague the industry — complexity and burnout for the IT and cybersecurity professionals dealing with the modern enterprise ecosystem; exposed credentials; and the increased likelihood and malicious actors compromising organizations.

Want more cybersecurity insights? Subscribe to the Cybersecurity as a Business Enabler channel:

Acceleration Economy Cybersecurity

Interested in GitGuardian?

Schedule a discovery meeting to see if we can help achieve your goals

Connect With Us

Book a Demo

authentication Cybersecurity featured HR MFA passwordless risk Risk Management security
Share. Facebook Twitter LinkedIn Email
Analystuser

Chris Hughes

CISO & Co-Founder
Aquia

Areas of Expertise
  • Cybersecurity
  • LinkedIn

Chris Hughes is an Acceleration Economy Analyst focusing on Cybersecurity. Chris currently serves as the Co-Founder and CISO of Aquia. Chris has nearly 20 years of IT/Cybersecurity experience. This ranges from active duty time with the U.S. Air Force, a Civil Servant with the U.S. Navy and General Services Administration (GSA)/FedRAMP as well as time as a consultant in the private sector. In addition, he also is an Adjunct Professor for M.S. Cybersecurity programs at Capitol Technology University and University of Maryland Global Campus. Chris also participates in industry Working Groups such as the Cloud Security Alliances Incident Response Working Group and serves as the Membership Chair for Cloud Security Alliance D.C. Chris also co-hosts the Resilient Cyber Podcast. Chris holds various industry certifications such as the CISSP/CCSP from ISC2 as holding both the AWS and Azure security certifications. He regularly consults with IT and Cybersecurity leaders from various industries to assist their organizations with their Cloud migration journeys while keeping Security a core component of that transformation.

  Contact Chris Hughes ...

Related Posts

Why Leaders from Cybersecurity and Data Teams Need Strong Relationships

March 21, 2023

Road to CIO Summit: Why Customers’ AI and Digital Transformation Stories Are So Valuable

March 21, 2023

Workday Co-CEO Aneel Bhusri One-on-One: Customers, AI/ML, New Role

March 21, 2023

How to Create New Procurement Savings Using AI and RPA to Streamline Purchasing

March 21, 2023
Add A Comment

Comments are closed.

Recent Posts
  • Why Leaders from Cybersecurity and Data Teams Need Strong Relationships
  • Road to CIO Summit: Why Customers’ AI and Digital Transformation Stories Are So Valuable
  • Workday Co-CEO Aneel Bhusri One-on-One: Customers, AI/ML, New Role
  • An Exciting Time for Enterprise Software | Aneel Bhusri on Business Models, CEO Priorities
  • How to Create New Procurement Savings Using AI and RPA to Streamline Purchasing

  • 2X a week
  • Analyst Videos & Articles
  • Exclusive Digital Business Content
This field is for validation purposes and should be left unchanged.
Most Popular Guidebooks

Securing Software-as-a-Service Applications

March 1, 2023

Retail Innovation With AI, Data, and Cybersecurity

March 1, 2023

Cloud Data Strategy, Analytics, and Governance

February 27, 2023

Cloud Wars Top 10 CEO Priorities

February 8, 2023

Advertisement
Acceleration Economy
Twitter LinkedIn
  • Home
  • About Us
  • Privacy Policy
  • Get In Touch
  • Advertising Opportunities
© 2023 Acceleration Economy.

Type above and press Enter to search. Press Esc to cancel.

  • Login
Forgot Password?

Connect with

Login with Google Login with Windowslive

Lost your password? Please enter your username or email address. You will receive a link to create a new password via email.