https://www.channelfutures.com/wp-content/themes/channelfutures_child/assets/images/logo/footer-new-logo.png
  • Home
  • Technologies
    • Back
    • SDN/SD-WAN
    • Cloud
    • RMM/PSA
    • Security
    • Telephony/UC/Collaboration
    • Cable
    • Mobility & Wireless
    • Fiber/Ethernet
    • Data Centers
    • Backup & Disaster Recovery
    • IoT
    • Desktop
    • Artificial Intelligence
    • Analytics
  • Strategy
    • Back
    • Mergers and Acquisitions
    • Channel Research
    • Business Models
    • Distribution
    • Technology Solutions Brokerages
    • Sales & Marketing
    • Best Practices
    • Vertical Markets
    • Regulation & Compliance
  • MSP 501
    • Back
    • 2022 MSP 501 Rankings
    • 2022 NextGen 101 Rankings
  • Intelligence
    • Back
    • Galleries
    • Podcasts
    • From the Industry
    • Reports/Digital Issues
    • Webinars
    • White Papers
  • Channel Futures TV
  • EMEA
  • Channel Chatter
    • Back
    • People on the Move
    • New/Changing Channel Programs
    • New Products & Services
    • Industry Honors
  • Resources
    • Back
    • Advisory Boards
    • Industry Organizations
    • Our Sponsors
    • Advertise
    • 2023 Editorial Calendar
  • Awards
    • Back
    • 2022 MSP 501
    • Channel Influencers
    • Circle of Excellence
    • DE&I 101
    • Technology Advisor 101 (TA 101)
  • Events
    • Back
    • 2023 Call for Speakers
    • CP Conference & Expo
    • MSP Summit
    • Channel Partners Europe
    • Channel Partners Event Coverage
    • Webinars
    • Industry Events
  • About Us
  • DE&I
Channel Futures
  • NEWSLETTER
  • Home
  • Technologies
    • Back
    • SDN/SD-WAN
    • Cloud
    • RMM/PSA
    • Security
    • Telephony/UC/Collaboration
    • Cable
    • Mobility & Wireless
    • Fiber/Ethernet
    • Data Centers
    • Backup & Disaster Recovery
    • IoT
    • Desktop
    • Artificial Intelligence
    • Analytics
  • Strategy
    • Back
    • Mergers and Acquisitions
    • Channel Research
    • Business Models
    • Distribution
    • Technology Solutions Brokerages
    • Sales & Marketing
    • Best Practices
    • Vertical Markets
    • Regulation & Compliance
  • MSP 501
    • Back
    • 2022 MSP 501 Rankings
    • 2022 NextGen 101 Rankings
  • Intelligence
    • Back
    • Galleries
    • Podcasts
    • From the Industry
    • Reports/Digital Issues
    • Webinars
    • White Papers
  • Channel Futures TV
  • EMEA
  • Channel Chatter
    • Back
    • People on the Move
    • New/Changing Channel Programs
    • New Products & Services
    • Industry Honors
  • Resources
    • Back
    • Advisory Boards
    • Industry Organizations
    • Our Sponsors
    • Advertise
    • 2023 Editorial Calendar
  • Awards
    • Back
    • 2022 MSP 501
    • Channel Influencers
    • Circle of Excellence
    • DE&I 101
    • Technology Advisor 101 (TA 101)
  • Events
    • Back
    • 2023 Call for Speakers
    • CP Conference & Expo
    • MSP Summit
    • Channel Partners Europe
    • Channel Partners Event Coverage
    • Webinars
    • Industry Events
  • About Us
  • DE&I
    • Newsletter
  • REGISTER
  • MSPs
  • VARs / SIs
  • Agents
  • Cloud Service Providers
  • Channel Partners Events
 Channel Futures

Security


Shutterstock

IAM

Why Organizations Are Failing at IAM and How True Identity Hygiene Can Help

  • Written by Rita Gurevich
  • October 31, 2022
Look beyond tooling for best identity and access management security of data, infrastructure and applications.
Sphere's Rita Gurevich

Rita Gurevich

Today’s organizations are inundated with a relentless stream of alerts from up to 76 different security tools in their arsenal, an increase of 18% from 2019 to 2021. Although advancements in tooling are necessary to combat shifting attack methods, the industry needs to approach the rising increase in data breaches in a fresh, strategic way.

Privilege misuse remained a top cause of financially motivated security incidents in 2021, with the majority of incidents resulting in data compromise, according to Verizon’s annual Data Breach Investigations Report (DBIR). The task at hand is clear — organizations need to look beyond tooling toward a complete shift in the way they approach identity and access management (IAM). More importantly, how they approach identity hygiene.

Put simply, identity hygiene consists of the activities organizations and individuals perform regularly to maintain the security of their data, infrastructure and applications. The goal of true identity hygiene is to ensure that the right people have access to the right information at all times, so an organization’s crown jewels are protected. Below, I will discuss a few challenges and common mistakes that hamper identity hygiene, along with practical steps IT and security leaders can take to ensure their identity hygiene programs are successful.

Stumbling Blocks on the Road to Identity Hygiene Success

As an IT practitioner and leader, you invest mounds of time and resources to solve complex issues derived from managing access across on-premises and cloud environments. That’s a pretty big burden to carry, and it’s understandable that in the rapid shift to the cloud, your teams are trying to keep their heads above the water.

One of the most challenging identity roadblocks in the industry is data correlation. This aspect of identity hygiene involves examining a company’s security policy, reviewing the target operating model (aka, the desired state of operation) and defining the discovery phase. Once all these pieces are in place, the data correlation process answers the question of “Who has access to what, why, and when at all times?” across the enterprise.

Another tripping point organizations are facing is the inability to take the IAM program to the finish line, or in other words, incomplete implementation. When there is incomplete implementation, it’s usually because IT teams lack a well-defined blueprint for guiding the entire life cycle program day by day, including priorities, sequences, budgets and staffing. Incomplete implementation can also mean a disorganized, or absent, “responsibility matrix.” In simpler terms, your enterprise may lack a clearly defined desired state of operation. To go even further, many enterprises are missing a proper transition from implementation to support. This creates a huge vulnerability among relevant IAM controls. It’s one thing to launch a program and another thing entirely to continue supporting it. Having a healthy system of transition is also key to ensuring consistency in program operations, regardless of who is managing it. Full documentation of a program’s blueprint lays the foundation for continued quality and success amid personnel changes.

Build Identity Hygiene Program Block by Block

It’s not easy to manage IT infrastructure, and cleaning up permissions and entitlements can be tedious. But there are building blocks you can begin setting in place that will lead to sustainable, transformational identity hygiene across the business. Let’s start with a high-level overview of what an effective IAM program should involve — the design, the build and the implementation.

The design stage is where the tech architecture blueprint is mapped out. As mentioned above, this is where key IT and security leadership come together to lay out all priorities, sequences, available budgets, and staff breakdowns. When there is an overarching plan to always fall back on, teams can spend their time and energy on their business, rather than investing valuable resources on baseline security. The build stage is where you will implement the data sources required to build the landscape of controls needed to initiate identity hygiene. The implementation stage is where the program will pick up speed, consisting of the review, reporting and remediation of potential issues identified during the previous stages. IT infrastructure teams should also be cognizant to monitor and mitigate risks continuously. Setting key performance indicators (KPIs) that are uniform across multiple teams should be in parallel with the long-term blueprint in the design stage. As you can see, these stages are a cycle of moving parts, dependent on each other for a successful program rollout.

Additional steps within the implementation stage that are very relevant to success involve defining what the crown jewels of your organization are, especially if you work in highly regulated industries with sensitive financial or health data. Defining the pillars that make up your IAM program is critical so that the entire initiative is well-divided. These pillars include identity management, access management, and privileged access management.

Reaching Identity Hygiene Maturity

Although these building blocks provide a way to break down your identity hygiene action plan, you must keep in mind that …

  • Page 1
  • Page 2
Tags: MSPs VARs/SIs Best Practices Security Technologies

Most Recent


  • New direction
    Deal to Buy Unify from Atos Seals New Direction for Mitel, CEO Explains
    The deal also includes a role for RingCentral.
  • Momentum
    Microsoft Security Now $20 Billion Business with 'Tremendous Momentum'
    One analyst says there's few legitimate obstacles in its path for further growth.
  • Intelisys Pre-AMP'd Marketing Forum
    Intelisys, Suppliers, Agents Take Aim at the Partner Marketing Gap
    Marketing is historically a second thought for the sales-focused world of technology advisors.
  • 2023 Opportunities
    There Are Plenty of New Opportunities for MSPs in 2023
    Partnership is key, along with automating data protection and cloud optimization technologies.

Leave a comment Cancel reply

-or-

Log in with your Channel Futures account

Alternatively, post a comment by completing the form below:

Your email address will not be published. Required fields are marked *

Related Content

  • CVx 2022
    ChannelVision Brings CVx 2022 to Scottsdale
  • CompTIA London 2022
    CompTIA EMEA 2022: Top 6 Talking Points
  • edge computing
    A Data Solution that Supports a Workforce at the Edge
  • Alexandra Zagury Cisco Partner SUmmit
    16 Takeaways from Cisco Partner Summit: Security Incentives, Subscription Push, More

Upcoming Events

View all

Channel Partners Conference & Expo

May 1, 2023 - May 4, 2023

Channel Partners Europe

June 13, 2023 - June 14, 2023

Channel Futures Leadership Summit

October 30, 2023 - November 2, 2023

Galleries

View all

Deal to Buy Unify from Atos Seals New Direction for Mitel, CEO Explains

January 26, 2023

Intelisys, Suppliers, Agents Take Aim at the Partner Marketing Gap

January 26, 2023

Ivanti: Everyone Should be Concerned About ChatGPT and Cybersecurity

January 25, 2023

Industry Perspectives

View all

Make the Most of the Gift of Time in 2023

January 25, 2023

Strong Partnerships Ease Challenging UPS Upgrade

January 24, 2023

The Advantages of Managed Networking and Security During Economic Uncertainty

January 5, 2023

Webinars

View all

Next-Generation MSP Platform: The Building Blocks for Your Business

February 15, 2023

Security Secrets of the MSP 501: How to Be a Cyber Leader in 2023

December 15, 2022
  • 1

Cybersecurity Certifications: Their Evolving Role in the Fight Against Increasing Attacks

December 13, 2022

White Papers

View all

Overcoming Your Endpoint Security Limitations with a Skeleton Crew

October 25, 2022

Embracing the Zero Trust Mindset For Endpoints

October 24, 2022

Endpoints are the Destination

October 24, 2022

Channel Futures TV

View all

Coffee with Craig and James Episode 117: Cato Networks, Video Killed the Podcast Stars

Retired Astronaut Capt. Scott Kelly Previews His CP Expo Keynote

December 21, 2022

Fusion Connect Eyes Future with Intrado UC, Managed Network Customers

September 23, 2022

RingCentral Focused on Hybrid Work, Microsoft Teams, Other Integrations

September 23, 2022

Twitter

ChannelFutures

The CEO of @Mitel discusses the likely outcomes of buying @Atos Unify. Note: @RingCentral will play a role post acq… twitter.com/i/web/status/1…

January 26, 2023
ChannelFutures

.@msftsecurity surpasses $20 billion in annual revenue, analysts say it's a formidable #cybersecurity market conten… twitter.com/i/web/status/1…

January 26, 2023
ChannelFutures

The adoption of cloud-based services ☁️ has spiked in the last few years and is among the top growth segments. See… twitter.com/i/web/status/1…

January 26, 2023
ChannelFutures

[email protected], @NICECXone, @lumencpp, @CiscoPartners joined @IntelisysCorp and partners for a day of marketing worksho… twitter.com/i/web/status/1…

January 26, 2023
ChannelFutures

.@IBM and @SAP announce #layoffs of thousands of employees dlvr.it/ShV2VY https://t.co/7QK1YqVpwa

January 26, 2023
ChannelFutures

#MSPs can boost #Channel business if they personalize the #DigitalExperience for partners, says @AvePoint.… twitter.com/i/web/status/1…

January 26, 2023
ChannelFutures

Consider mental health in the context of DE&I. Create safe spaces where employees can feel comfortable being who th… twitter.com/i/web/status/1…

January 26, 2023
ChannelFutures

.@GoIvanti's CSO says #ChatGPT poses numerous cybersecurity concerns. dlvr.it/ShRmdt https://t.co/n22RZ4PZaO

January 25, 2023

MSP 501

The industry's largest and most comprehensive partner awards program.

Newsletters and Updates

Sign up for The Channel Report, Channel Futures Update, MSP 501 Newsletter and more.

Live Channel Events

Get the latest information on the next industry-leading Channel Partners event.

Galleries

Educational slide shows and images from live events.

Media Kit And Advertising

Want to reach our audience? Access our media kit.

DISCOVER MORE FROM INFORMA TECH

  • Channel Partners Events
  • Telecoms.com
  • MSP 501
  • Black Hat
  • IoT World Today
  • Omdia

WORKING WITH US

  • Contact
  • About Us
  • Advertise
  • Newsletter

FOLLOW Channel Futures ON SOCIAL

  • Privacy
  • CCPA: “Do Not Sell My Data”
  • Cookie Policy
  • Terms
Copyright © 2023 Informa PLC. Informa PLC is registered in England and Wales with company number 8860726 whose registered and Head office is 5 Howick Place, London, SW1P 1WG.
This website uses cookies, including third party ones, to allow for analysis of how people use our website in order to improve your experience and our services. By continuing to use our website, you agree to the use of such cookies. Click here for more information on our Cookie Policy and Privacy Policy.
X