IGA & Identity Management - Simplified

Jatin Shetty
5 min readMay 22, 2024

--

Don’t know what IAM means? Neither did I for a long time.

While I was spending a few weeks thinking about what complicated, super cool topic I can write about in my first article, I realized that the field I am an expert in — Identity and Access Management, is something that a lot of people have never heard about, let alone understand it.

Even my wife, who is a data scientist at a fancy startup, doesn’t really understand what I do and why my role is critical in many organizations.

So decided to start with the basics :)

While IAM involves way too many topics when you dive deep, we will be focusing this article mostly on the IGA and Identity Management side of things.

What is Identity Management?

To understand what Identity Management is, there are a few concepts that you need to understand first.

Lifecycle Management

  • Like the name suggests, its about managing the life of an object. Usually referred to as LCM.
  • A lifecycle is basically different stages of an object. From the time its created, through the times it gets updated, moved around and all the way to the time it is deleted.
  • The term lifecycle gets applied to multiple things, from software, to projects, to cloud resources, to user accounts and many more.
  • For our topic here, we will bring User Account Lifecycle Management into the spotlight.

Terminology Alert! (but explained with a scenario)

Lets say you get hired at an organization. Once you accept the offer, there are a series of events that get fired off, mostly invisible to you.

  • You get automated emails with details of tasks you have to complete to begin your hiring process.
  • Background checks initiated.
  • Laptops or mobile devices shipped to your home. (hopefully with some goodies)
  • Username and password will be securely shared with you to login to your device.
  • Once logged in, your email would have magically been set up and there are 173 emails that you need to go through!
  • Your team started pinging you links and resources on Slack/Teams/Hangouts

You somehow seem to have access to most of the systems you need to work on.

And that ladies & gentlemen is the Joiner process at work. (Atleast that is what its called as in the IAM world).

It is the process developed that enables all the listed tasks above to be executed in a clean, systematic way. In other words — Codifying the process.

Alright lets keep going!

  • Now that you have joined the organization, you really like working there.
  • You have built, managed and administered various tools and systems as a part of your role.
  • You learnt everything there is to learn in your team and now you want to move to a different team. You know, to keep life interesting and all.
  • However, when you move to your new team, the systems that you will be working with will be completely different from your previous ones.
  • And to add to this, you no longer need access to the systems from your previous team.
  • But wait! The morning you officially move teams, you login into your laptop and you feel different.
  • Your manager has now changed to the new manager.
  • You are now a part of the new team’s email distribution list and have 1172 emails to go through.
  • Its déjà vu! You magically have access to all the new systems and tools that your teammates are sending links to.
  • You no longer are able to access the tools and links you had from your previous team!

Well, that is the Mover process in action. While the mover process would not be as drastic as what is mentioned above, this is one process a lot of organizations either completely skip, or have very different implementations from one another.

The story continues…

  • One fine day you buy a home you can’t afford and your pay at your current company just aint doing it.
  • So you decide to look for greener pastures and leave.
  • After you finish your notice period, the next day you realized that you wanted to refer some document or code that you had created at your now ex-employer’s application.
  • You have all the links memorized so you hit the application, put in your credentials.
  • You realize — Your credentials don't work anymore.
  • The laptop that your have to ship back to the company that evening isnt letting you in either.
  • All apps on your phone for messaging and emails don't let you in.

What just happened?

What happened was arguably one of the most important part of IAM, the Leaver process. You would have lost all access to the system and your account would probably be disabled.

These 3 processes are core to LCM. Sometimes abbreviated as JML.
Joiner, Mover and Leaver.

The JML processes have been around decades, but defining standards for these is a fairly new thing. You can read about these standards on the NIST website, but that might be too much at this stage.

There are also a multitude of companies that have tools to codify these processes. Prominent among them are Okta, Sailpoint, Auth0, OneLogin etc.

Now that you have a fair idea of what User Lifecycle Management is. There is one more important concept that needs to be explained to tie of this together.

Access Reviews / Access Certifications

  • Simply put, access reviews is when your manager comes and looks at the systems you have access to.
  • The manager is then responsible to make a decision on whether you can continue to keep that access or remove some or all of this access.
  • This is usually an Audit requirement and it is done on a regular basis. Quarterly or twice a year or sometimes monthly.
  • All of these vary depending on how sensitive the access is and/or who’s access is being reviewed.

Summary

You will come across IAM as one of the domains in Cyber Security if you ever find yourself preparing for a CISSP certification. But, it is something that you touching everyday without even realizing it.

Note: This is definitely not everything that IAM has, but I’ll leave it at this.
Keep an eye out for more articles around this topic.

Additional reading about why IAM is important can be found here: Why is IAM important?

Resources

--

--

Jatin Shetty
Jatin Shetty

Written by Jatin Shetty

A Soldier in the Cyber Security Warfare.

No responses yet