Hard2bit
← Back to glossary Identity and access security

Identity and Access Management

What is identity and access management?

Identity and Access Management, usually shortened to IAM, is the discipline of defining and controlling who can access which systems, applications, data, and services, and under what conditions. It includes identities, roles, authentication, authorization, permissions, lifecycle management, access reviews, and technical enforcement. In practice, IAM is what determines whether an employee, contractor, administrator, workload, or third-party service should access a resource and with which privileges.

Why it matters

Many security incidents are not caused by sophisticated malware but by weak identity controls: overprivileged accounts, orphaned users, reused credentials, missing MFA, poor joiner-mover-leaver processes, or service accounts with excessive access. IAM matters because identities have become the new perimeter. If an attacker compromises a valid identity, they can often move through systems without needing to exploit anything else. Strong IAM reduces that blast radius, improves accountability, and supports compliance requirements such as ISO 27001, NIS2, DORA, and ENS.

Key points

IAM combines authentication, authorization, identity lifecycle management, role design, and access governance into one operating model.

It applies not only to human users, but also to service accounts, applications, APIs, devices, and privileged administrators.

Strong IAM usually includes least privilege, MFA, role-based access control, periodic access reviews, and rapid deprovisioning when roles change.

Bad IAM creates business risk through privilege creep, excessive standing access, shadow accounts, and weak visibility over who can access what.

IAM is a foundational control for Zero Trust because every access request should be validated based on identity, context, and policy.

Example: IAM limits damage after credential compromise

A company has Microsoft 365, cloud infrastructure, HR systems, and customer data platforms. One employee falls for phishing and their account is compromised. In a weak IAM model, that user may still have legacy permissions from previous roles, no MFA, and access to sensitive systems they no longer need. In a mature IAM model, the same account is protected by MFA, restricted to a defined role, blocked from privileged access, and monitored for risky sign-in behaviour. The attacker may still get a foothold, but their ability to escalate, move laterally, or exfiltrate data is significantly reduced.

Common mistakes

  • Treating IAM as only a login problem. IAM is not just authentication; it also includes authorization, lifecycle, governance, and review.
  • Leaving access in place after role changes. Privilege creep is one of the most common IAM failures in growing companies.
  • Ignoring non-human identities. Service accounts, integrations, API tokens, and automation identities are often more overprivileged than human users.
  • Granting broad admin rights for convenience. Standing privileged access creates unnecessary exposure and increases post-compromise impact.
  • Not reviewing access regularly. If nobody checks who has access to critical systems, IAM degrades over time even if it looked correct at rollout.

Related services

This concept is often connected to services such as:

Frequently asked questions

Is IAM only relevant for large enterprises?

No. Smaller companies are often more exposed because access grows informally and nobody owns identity governance. Even with a small team, IAM matters for onboarding, offboarding, MFA, admin segregation, SaaS access, and cloud roles. The earlier it is structured, the easier it is to scale securely.

What is the difference between IAM and access control?

Access control is one part of IAM. IAM is the broader discipline that covers identity creation, authentication, authorization, roles, reviews, lifecycle, governance, and technical enforcement. Access control focuses more specifically on deciding and enforcing who can do what.

Does IAM apply to cloud and SaaS as well as internal systems?

Yes. Modern IAM must cover cloud providers, SaaS platforms, Microsoft 365, privileged accounts, third-party integrations, APIs, and non-human identities. In many organisations, cloud and SaaS IAM is more critical than traditional on-premise access.

What are the first IAM improvements most companies should make?

A practical starting point is to enforce MFA, review privileged accounts, remove unused access, define role-based access by function, and tighten joiner-mover-leaver processes. After that, access reviews, conditional access, and privileged access controls usually deliver strong risk reduction.