2020-08-04T07:33:00Z

Why is identity and access management (IAM) so important in preventing data breaches?

30

Hi peers,

What role does IAM play in preventing data breaches? What are the risks associated with not using an IAM solution?

ITCS user
Guest
44 Answers

author avatar
Top 5LeaderboardReal User

Absolutely! IAM is so important to prevent a data breach. With IAM we can make sure only the right user can access the right DATA. If there is a privilege abuse or lateral movement action, IAM will inform us and we can take an action to investigate, block or prevent it.

2021-05-19T02:11:05Z
author avatar
Top 5LeaderboardReal User

There could be 2 types of action that can be taken to measure the data breach


1) Proactive, where management decides the policy and a team implements those policies to avoid a data breach. Like DlP, Firewall along with IDAM.


2) Passive: where you take action to avoid as much data loss you can. Here the management is mostly interested in who, from where and why tried to brach data. Documentation and announcement is an important role here.


Now coming to IDAM :


IDAM makes policies, where an admin has control to implement who, when and how will access your data and at what level.


IDAM also segregates the duties of each employee so that everyone has accountability for work done.


If we look at the access part, IDAM will ensure that only authorized people have access to your application including the level of access decided by an admin.


In short, IDAM is a solution to all the actions a user or employee can take on your data and how they can view your data. it will help you to clearly divide the threat and real user( either outsider or insider)

2021-05-17T12:32:25Z
author avatar
Top 20Real User

Since cybercrime is on the aggressive rise, and our organizations working practices have evolved from on-premise with some VPN to full remote workers - the security perimeter around physicals buildings with firewalls has moved down the list of importance. No the security perimeter is around your individual users, and the key foundation security elements are Identity & Access Management.  To determine and confirm a user is who they say they are! Identity & Access Management feeds into all other security products which are layered on top so it's critical to have one that addresses all your needs and is somewhat future proofed - as this landscape is constantly changing.


Couple of question to ask yourself - 


What is your current security landscape related to identity?


What are your greatest security concerns related to identity?


What are your top three desired improvement areas?



Cheers!



Steve

2021-05-19T16:28:21Z
author avatar
Community Manager

Hello @SylvainMaertchik ​, @Matt Thomson ​and @Amimesh Anand. What is your professional opinion?

2021-05-17T11:34:47Z
Find out what your peers are saying about SailPoint, ForgeRock, Broadcom and others in Identity Management (IM). Updated: June 2021.
512,221 professionals have used our research since 2012.