Cybersecurity professionals are getting more involved in identity and access management (IAM) decisions and day-to-day operations driving changes to IT and infosec. Anyone familiar with identity management knows that it can be extremely messy – lots of tactical tools, access policies, multiple data repositories, manual processes, etc. Furthermore, user authentication continues to be anchored by user names and passwords making nearly every organization vulnerable to credentials harvesting, identity theft, and cyber attacks.These persistent IAM problems remain, even though identity management is becoming a bigger component of enterprise security. This is true because, as organizations embrace cloud and mobile computing, they lose some control over their IT infrastructure. As one CISO mentioned to me, “when we lose control in some areas we need to get better control over others as compensating controls.” Thus, identity management is transitioning into a new security perimeter at many enterprise organizations.ESG recently undertook a research project on the links between IAM and cybersecurity and published the results in a research report titled, A Cybersecurity Perspective on Identity and Access Management (note: I am an ESG employee). ESG discovered that 87% of enterprise organizations (i.e. more than 1,000 employees) say that the cybersecurity team has become more involved with IAM policy, process, and technology decisions and operations over the past two years. Why the increased cybersecurity oversight of IAM? 36% said that the cybersecurity team had become more involved with IAM in order to improve risk management and security best practices.36% said that the cybersecurity team had become more involved with IAM to better detect things like credentials theft, remote access, and illegitimate account provisioning often associated with cyber attacks.33% said that the cybersecurity team had become more involved with IAM in order to improve regulatory compliance.33% said that the cybersecurity team had become more involved with IAM because their organizations had opened more internal applications and services to external users.31% said that the cybersecurity team had become more involved with IAM because of the increasing use of cloud and mobile computing by their organizations.As CISOs gain more responsibility and oversight for IAM, ESG foresees a number of ramifications: Organizations will consider more enterprise IAM projects. Today’s tactical IAM is fraught with security vulnerabilities and operational overhead. Security requirements may serve as a catalyst for strategic multi-million dollar IAM projects not seen since the 1990s. Vendors like CA, IBM, Microsoft, Oracle and RSA Security stand to benefit from this trend.Enterprises become more open to cloud-based control planes. SaaS offerings for IAM (i.e. Centrify, Okta, Ping, etc.) may become more attractive as CISOs seek pragmatic solutions to unify the existing morass of point tools with a common cloud-based control plane.User name/password authentication is one of the first things to go. Everyone knows that user name/password authentication is a security nightmare, but it’s been way too expensive to replace this method with security tokens or smart cards in the past. Wide support for the FIDO specification and pervasive biometrics built into mobile devices may finally bury user name/password authentication for good.IAM skills become more valuable and rare. Enterprise organizations will look to hire IAM architects and engineers but quickly discover that these skill sets are as rare as a blue lobster. IAM service specialists like Accenture, E&Y, HP, PWC, and Unisys will bridge this gap and print money in the process. Related content analysis 5 things security pros want from XDR platforms New research shows that while extended detection and response (XDR) remains a nebulous topic, security pros know what they want from an XDR platform. By Jon Oltsik Jul 07, 2022 3 mins Intrusion Detection Software Incident Response opinion Bye-bye best-of-breed? ESG research finds that organizations are increasingly integrating security technologies and purchasing multi-product security platforms, changing the industry in the process. By Jon Oltsik Jun 14, 2022 4 mins Security Software opinion SOC modernization: 8 key considerations Organizations need SOC transformation for security efficacy and operational efficiency. Technology vendors should come to this year’s RSA Conference with clear messages and plans, not industry hyperbole. By Jon Oltsik Apr 27, 2022 6 mins RSA Conference Security Operations Center opinion 5 ways to improve security hygiene and posture management Security professionals suggest continuous controls validation, process automation, and integrating security and IT technologies. By Jon Oltsik Apr 05, 2022 4 mins Security Practices Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe