Simplified diagram
Learn what Identity and Access Management (IAM) is, its key functions, benefits, threats, and modern IAM solutions to secure enterprise access.
In a nutshell, Identity and Access Management (IAM) is a framework made up of policies and technologies to determine who is allowed to access what resources and under what circumstances. When users attempt to access resources such as applications, their credentials are authenticated. Once verified, their level of access is determined through authorisation, and they are granted permissions to access only what is necessary — a process known as identity and access control.
Simplified diagram
Here are some of the leading IAM tools used in modern environments:
Once again, we see AI making an appearance in the security space. It is being integrated as a means to improve security indetecting anomalies, improve user experience and automating processes such as provisioning and deprovisioning among others. Machine learning in access control is particularly useful for identifying unusual patterns in user behaviour and strengthening authentication mechanisms.
One of the methods IAM relies on for authentication is the use of usernames and passwords. This poses an obvious threat of account compromise if credentials are stolen. Below are some of the ways attackers are able to obtain credentials or access to systems using the victims’ account.
These attacks allow a threat actor to gain unauthorised access to a system as the compromised user.
Multi-factor authentication security can be used to strengthen security, but it is not without its shortfalls. MFA that uses emails or SMS are susceptible to phishing, inerception and compromise, Natiotnal Institute of Standards and Technology (NIST) guidelines on digital identity and authentication recommends against using them. It also recommends that more Phishing-resistant MFA methods are used, some of these are:
1. Hardware Authentication Device:
Physical devices such as the Yubikey from Yubico provides a more secure method of authentication due to the following.
2. FIDO2 (Fast Identity Online 2):
This is an open standard for user authentication that uses public key cryptography to replace passwords. It works by generating a pair of keys, one private key which is kept on the user’s device, and another public key which is encrypted and shared with the internet site that the user needs to access. These keys are unique for each internet site and eliminate the risks of phishing, all forms of password theft and replay attacks.
3. Single Sign-On (SSO):
Allows users to log in once and access multiple applications without re-entering credentials, improving security and user experience.
4. Passwordless Authentication:
Uses methods like biometrics or security keys instead of passwords, reducing the risk of weak passwords. Passwordless login is a growing trend in modern identity access management systems.
There are other solutions however this article has chosen to mention these options.
Submit your details and we’ll help you find the best IAM approach.
Henry Finnah
Security Service Engineer|KDDI Europe