Why IAM must be part of your data security conversations
The short answer is because it is the key zero trust pillar. Yes, data, applications, devices, networks, infrastructure, and reporting and analytics solutions are also extremely important, however, you can’t exclude authentication and authorization, even if you are not the main responsible for that. I’m not suggesting that the rest of the pillars are optional or merely nice to have.
I find data protection an extremely interesting topic, and more when I see that they are a mix of technical and non-technical. For example, we could discuss specific solutions, features and capabilities that should be implemented, how they work, etc., together with industry regulations, certifications, requirements, consequences of data breaches, reputation, fines, and more.
From an identity perspective, it is my job to offer solutions that aim to protect everything related to the different topics that are around the authorization and authentication mainly, like the basics of identity and access management (IAM, again), identity governance and administration (IGA), privileged access management (PAM), provisioning, separation/segregation of duties (SoD), access reviews, lifecycle workflows, integration with HR solutions, passwords and policies management, and reporting/analytics.
As an identity specialist, some of the most common data security scenarios that I discuss include:
If you notice, many of the scenarios described above relate to accessing sensitive or non-sensitive information as well as others that are more related to what’s happening after a user is authenticated and authorized.
领英推荐
For customers and companies that take security as a priority, I hope you find this article useful.
If you are a cybersecurity seller don’t sell by following a siloed approach (i.e: I do identity; don’t talk to me about data). If you are involved in a conversation that goes beyond your area of expertise involve someone else. This is a triple win: you; the other seller; and the customer.
If you still think that identity is not important because “it just works” after reading this or even if you think that identity is a commodity sooner or later what could go wrong will go wrong.
Thanks for reading,
Marcelo.
HRIS Professional/Specialist | HR Coordinator/Administrator | HCM Temporary/Contractor | HRIS Onboarding | HRIS Reporting
1 年Do you think most companies underestimate the importance of identity security?
IT Risk Management | IT Security and Controls | Asset Management
1 年Augustine Nwaka
Azure Technical Specialist
1 年#cfbr