There seems to be continuing confusion about what access management means. In layman’s terms, accessing an application implies the process of authentication — i.e., opening a browser or accessing a link — where you may be prompted to enter your credentials. If the user provides the right set of credentials, he or she gains access to that application — simple as that.

On the other hand, access management of an application relates to authorization, like what a person can view, change or delete within an application. Using an application or system usually involves requesting entitlement/permission and then gaining access after approval. In identity and access management (IAM), we call that managing access life cycle.

A Painful Process

In many large corporations, requesting access to an application or server is a painful process. Users frequently complain to system owners and administrators about the need to use multiple systems to gain access to the applications they need. Once granted, however, users keep access as long as they are employed by the company — in some cases, even after they leave. Talk about a compliance and security nightmare.

Your organization’s access approver must answer the following questions:

  • Do you have a view of all your employees’ accesses?
  • Do you really know how employees’ access impacts the corporation?
  • Do you know whether an access could lead to a data breach?

Simply put, it’s a difficult task to ensure your employees have the right access. Often, access approvers simply don’t know the answers to the questions above.

Finding an Access Management Resolution

With all the modern tooling and sophisticated security requirements we’ve adopted, why haven’t we been able to solve these problems? Some corporations may claim they have, and many times over. In some cases, single organizations adopt more than 100 solutions, from simple to very sophisticated compliance tools. Users must work through this labyrinth of siloed solutions to gain access, which is one of the key reasons user satisfaction is low. This splintered management also leads to a lack of visibility and introduces risk that could lead to data breaches.

As corporations rapidly embrace the digital era, it’s more important than ever to find an access management resolution. Today, corporations are consuming and/or providing services differently, using models such as software-as-a-service (SaaS), platform-as-a-service (PaaS) and infrastructure-as-a-service (IaaS). This proliferation of identity data into different flavors of cloud environments makes it impossible to gain a good handle on access data. We simply need to do a better job than we are doing now.

Battling Bimodality

While this certainly is a fast-growing problem, we must also consider legacy solutions — financial applications, for instance — that rely on mainframes. Such severe bimodality coexists in the enterprise, so it’s hard to have a single unifying access management resolution that delivers all desired goals for both old and new IT footprints.

Additionally, some lines of business do not tolerate disruptions — nothing should impact or impede the growth of the business. It’s critical that we jump onto this fast-moving digital train, elegantly manage our heritage systems and transform without disrupting our business.

There is a brighter side, however. I’m excited to announce the IBM CIO Identity Services initiative, which aims to unite all access information in a single hub. We’ll cover the ways in which this strategic initiative can help solve our cybersecurity problems in my next blog post.

More from Cloud Security

Is Your Critical SaaS Data Secure?

4 min read - Increasingly sophisticated adversaries create a significant challenge as organizations increasingly use Software-as-a-Service (SaaS), Platform-as-a-Service (PaaS) and Infrastructure-as-a-Service (IaaS) to deliver applications and services. This mesh of cloud-based applications and services creates new complexities for security teams. But attackers need only one success, while defenders need to succeed 100% of the time. Organizations are contending with an exponential rise in advanced threats that are not only increasing in volume but also sophistication. The IBM Cost of Data Breach Report 2022 found…

4 min read

Rationalizing Your Hybrid Cloud Security Tools

3 min read - As cyber incidents rise and threat landscapes widen, more security tools have emerged to protect the hybrid cloud ecosystem. As a result, security leaders must rapidly assess their hybrid security tools to move toward a centralized toolset and optimize cost without compromising their security posture. Unfortunately, those same leaders face a variety of challenges. One of these challenges is that many security solutions create confusion and provide a false sense of security. Another is that multiple tools provide duplication coverage…

3 min read

New Generation of Phishing Hides Behind Trusted Services

4 min read - The days when email was the main vector for phishing attacks are long gone. Now, phishing attacks occur on SMS, voice, social media and messaging apps. They also hide behind trusted services like Azure and AWS. And with the expansion of cloud computing, even more Software-as-a-Service (SaaS) based phishing schemes are possible. Phishing tactics have evolved faster than ever, and the variety of attacks continues to grow. Security pros need to be aware. SaaS to SaaS Phishing Instead of building…

4 min read

The Importance of Modern-Day Data Security Platforms

4 min read - Data is the backbone of businesses and companies everywhere. Data can range from intellectual property to critical business plans to personal health information or even money itself. At the end of the day, businesses are looking to grow revenue, innovate, and operationalize but to do that, they must ensure that they leverage their data first because of how important and valuable it is to their organization. No matter the industry, the need to protect sensitive and personal data should be…

4 min read