Identity Governance and
Administration (IGA)
What are the top problems?
What are the Top 3 Problems in IGA?
1. Visibility into access
o Do you really have the right access? How has an employee’s access
changed over their lifecyle within the organization? Typically, the
longer you’re here, the more access you accumulate.
2. Third Party User Management:
o It’s the Wild West when it comes to managing contractors…
3. Certifying Access:
o We want to do more access reviews, but it’s so time consuming that
only the minimum reviews are being done.
1. Visibility into access: What’s Right?
How do we assign roles and entitlements?
Time with the company
Amountofentitlements
Entitlement ‘creep’:
• How do you manage
this?
• How do justify removing
entitlements?
1. Visibility into access: What’s Right?
How do we assign roles and entitlements?
Issues with this approach:
• Are the starting roles even right?
• How do you know you haven’t
over- or under- provisioned?
• Are the people getting these roles
similar enough?
User 1
Department: A
User 2
Department: A
New User 3
Department: A
Amount of matches
in entitlements:
10/10
Percentage: 100%
Good match for
new User Role
Conventional Approach:
What’s Right?
Optimal Approach:
Visual Grouping:
A system that allows
automatic grouping of like
entitlements; roles are
seen as overlays to
incoming data
Available Entitlements
2. Third Party User Management
HR System
IGA System
X
Open Accounts:
Preferred targets for
criminal operators
May June July August September October November
3. Certifying Access
How do I review so many entitlements?
Certification review Cycle
Timeneededforreview
Entitlements per Employee
Manager Employees
Why so much time needed to run Certifications?
This is what a Manager has to review…
“Where do I even start, and
when will I have time for
this?
Answer: Let’s make things easier…
Data Visualization
Summary
1. Visibility into access
o Typically, the longer you’re here, the more access you accumulate.
o Answer: Keep visibility into entitlement growth by instituting an IGA program that
continuously monitors entitlements and provides an easy visualization into the
state of the business.
2. Third Party User Management:
o It’s the Wild West when it comes to managing contractors…
o Answer: Incorporate contractors into your IGA program/suite. This ensures
continual vigilance and reduction of your attack surface area.
3. Certifying Access:
o We want to do more access reviews, but it’s so time consuming that only the
minimum reviews are being done.
o Answer: Make things easier for your reviewers; provide them the tools necessary
to perform quick reviews!
THANK YOU!
© 2018 by SecureAuth + Core Security
All rights reserved

More Related Content

PDF
3 Ways Machine Learning Facilitates Fraud Detection
PPTX
Boomtrain deck
PPT
False Website Downtime Alerts Are More Than a Nuisance
PPT
Cloud Compliance Use Case Demo
PPTX
4 ways to defend against internal attacks
PPTX
4 Ways to Defend Against Internal Attacks
PPTX
The 3 core indicators
PPTX
How can I Make the Remote Hiring Process Less Painful?
3 Ways Machine Learning Facilitates Fraud Detection
Boomtrain deck
False Website Downtime Alerts Are More Than a Nuisance
Cloud Compliance Use Case Demo
4 ways to defend against internal attacks
4 Ways to Defend Against Internal Attacks
The 3 core indicators
How can I Make the Remote Hiring Process Less Painful?

Similar to How to Solve the Top 3 Struggles with Identity Governance and Administration (IGA) (20)

PDF
A Detailed Explanation On The Marking Criteria For Ielts Writing Task 1 ...
PDF
Credit Union Cyber Security
PDF
𝐂𝐫𝐚𝐜𝐤 𝐭𝐡𝐞 𝐂𝐈𝐒𝐀 𝐄𝐱𝐚𝐦: 𝐄𝐬𝐬𝐞𝐧𝐭𝐢𝐚𝐥 𝐏𝐫𝐞𝐩 𝐈𝐧𝐬𝐢𝐠𝐡𝐭𝐬!
PDF
Ace the CISA Exam: Must-Know Insights for Success
PDF
Commonly Asked CISA Exam Questions with Answers.pdf
PDF
Commonly Asked CISA Exam Questions with Answers.pdf
PDF
CISA Exam Prep Practice Questions and Answers
PDF
Commonly Asked CISA Exam Questions with Answers..pdf
PDF
𝐂𝐫𝐚𝐜𝐤 𝐭𝐡𝐞 𝐂𝐈𝐒𝐀 𝐄𝐱𝐚𝐦: 𝐄𝐬𝐬𝐞𝐧𝐭𝐢𝐚𝐥 𝐏𝐫𝐞𝐩 𝐈𝐧𝐬𝐢𝐠𝐡𝐭𝐬!
PDF
PayrollHero Manager's TAS Guide
PPTX
Vendors, and Risk, and Tigers, and Bears, Oh My: How to Create a Vendor Revie...
PPTX
Information Systems Audit - week 2 lecture
PDF
Kellogg Video Essay Question List. Online assignment writing service.
PPT
service metrics at ITSMFUSA 2008
PPTX
FixNix 17 products1.0
PDF
PKF S&S_Newsletter Issue No 5-2013
PPTX
ppt on e crime management system
DOCX
Mf0013 internal audit and control
PPTX
How to Stay on Top of Users' Identities and their Access Rights
PDF
A Comprehensive Guide to AI and Automation in Staff Augmentation
A Detailed Explanation On The Marking Criteria For Ielts Writing Task 1 ...
Credit Union Cyber Security
𝐂𝐫𝐚𝐜𝐤 𝐭𝐡𝐞 𝐂𝐈𝐒𝐀 𝐄𝐱𝐚𝐦: 𝐄𝐬𝐬𝐞𝐧𝐭𝐢𝐚𝐥 𝐏𝐫𝐞𝐩 𝐈𝐧𝐬𝐢𝐠𝐡𝐭𝐬!
Ace the CISA Exam: Must-Know Insights for Success
Commonly Asked CISA Exam Questions with Answers.pdf
Commonly Asked CISA Exam Questions with Answers.pdf
CISA Exam Prep Practice Questions and Answers
Commonly Asked CISA Exam Questions with Answers..pdf
𝐂𝐫𝐚𝐜𝐤 𝐭𝐡𝐞 𝐂𝐈𝐒𝐀 𝐄𝐱𝐚𝐦: 𝐄𝐬𝐬𝐞𝐧𝐭𝐢𝐚𝐥 𝐏𝐫𝐞𝐩 𝐈𝐧𝐬𝐢𝐠𝐡𝐭𝐬!
PayrollHero Manager's TAS Guide
Vendors, and Risk, and Tigers, and Bears, Oh My: How to Create a Vendor Revie...
Information Systems Audit - week 2 lecture
Kellogg Video Essay Question List. Online assignment writing service.
service metrics at ITSMFUSA 2008
FixNix 17 products1.0
PKF S&S_Newsletter Issue No 5-2013
ppt on e crime management system
Mf0013 internal audit and control
How to Stay on Top of Users' Identities and their Access Rights
A Comprehensive Guide to AI and Automation in Staff Augmentation
Ad

More from Core Security (20)

PPTX
Lazy Penetration Tester Tricks
PDF
Thanks for All the Phish: Introducing Core Impact 18.1
PDF
Identity + Security: Welcome to Your New Career
PDF
Put Analytics And Automation At The Core Of Security – Joseph Blankenship – S...
PDF
No More SIlos: Connected Security - Mike Desai and Ryan Rowcliffe
PDF
Modern Authentication – Turn a Losing Battle into a Winning Strategy, Robert ...
PDF
Security Consulting Services - Which Is The Best Option For Me? - Diego Sor, ...
PDF
Threat Dissection - Alberto Soliño Testa Research Director, Core Security
PDF
How to Defeat the Vulnerability Hydra - Andy Nickel Sales Engineer, Core Secu...
PDF
Understanding Network Insight Integrations to Automate Containment and Kick S...
PDF
Product Vision - Stephen Newman – SecureAuth+Core Security
PDF
The Good, the Bad, and The Not So Bad: Tracking Threat Operators with Our Thr...
PDF
Introducing Core Role Designer - Michael Marks Product Manager - Identity, Co...
PDF
Core Connector API Demo - Michael Marks Product Manager - Identity, Core Secu...
PDF
Access Assurance Suite Tips & Tricks - Lisa Lombardo Principal Architect Iden...
PDF
The Why - Keith Graham, CTO – SecureAuth+Core Security
PDF
Vulnerability Insight Tips & Tricks - Magno Gomes SE Manager, Core Security
PDF
Network Insight: How To Assess Findings - Tier 1 SOC Triage - Mark Gilbert ,T...
PPTX
10 IT Security Trends to Watch for in 2016
PDF
Trending it security threats in the public sector
Lazy Penetration Tester Tricks
Thanks for All the Phish: Introducing Core Impact 18.1
Identity + Security: Welcome to Your New Career
Put Analytics And Automation At The Core Of Security – Joseph Blankenship – S...
No More SIlos: Connected Security - Mike Desai and Ryan Rowcliffe
Modern Authentication – Turn a Losing Battle into a Winning Strategy, Robert ...
Security Consulting Services - Which Is The Best Option For Me? - Diego Sor, ...
Threat Dissection - Alberto Soliño Testa Research Director, Core Security
How to Defeat the Vulnerability Hydra - Andy Nickel Sales Engineer, Core Secu...
Understanding Network Insight Integrations to Automate Containment and Kick S...
Product Vision - Stephen Newman – SecureAuth+Core Security
The Good, the Bad, and The Not So Bad: Tracking Threat Operators with Our Thr...
Introducing Core Role Designer - Michael Marks Product Manager - Identity, Co...
Core Connector API Demo - Michael Marks Product Manager - Identity, Core Secu...
Access Assurance Suite Tips & Tricks - Lisa Lombardo Principal Architect Iden...
The Why - Keith Graham, CTO – SecureAuth+Core Security
Vulnerability Insight Tips & Tricks - Magno Gomes SE Manager, Core Security
Network Insight: How To Assess Findings - Tier 1 SOC Triage - Mark Gilbert ,T...
10 IT Security Trends to Watch for in 2016
Trending it security threats in the public sector
Ad

Recently uploaded (20)

PPTX
Python is a high-level, interpreted programming language
PPTX
Lecture 5 Software Requirement Engineering
PPTX
Airline CRS | Airline CRS Systems | CRS System
PDF
The Dynamic Duo Transforming Financial Accounting Systems Through Modern Expe...
PPTX
most interesting chapter in the world ppt
PPTX
4Seller: The All-in-One Multi-Channel E-Commerce Management Platform for Glob...
PPTX
MLforCyber_MLDataSetsandFeatures_Presentation.pptx
PPTX
GSA Content Generator Crack (2025 Latest)
PPTX
Tech Workshop Escape Room Tech Workshop
DOCX
Modern SharePoint Intranet Templates That Boost Employee Engagement in 2025.docx
PDF
Introduction to Ragic - #1 No Code Tool For Digitalizing Your Business Proces...
PPTX
Computer Software - Technology and Livelihood Education
PDF
EaseUS PDF Editor Pro 6.2.0.2 Crack with License Key 2025
PDF
Topaz Photo AI Crack New Download (Latest 2025)
PPTX
Full-Stack Developer Courses That Actually Land You Jobs
PDF
DuckDuckGo Private Browser Premium APK for Android Crack Latest 2025
DOC
UTEP毕业证学历认证,宾夕法尼亚克拉里恩大学毕业证未毕业
PPTX
How to Odoo 19 Installation on Ubuntu - CandidRoot
PDF
CCleaner 6.39.11548 Crack 2025 License Key
PPTX
Download Adobe Photoshop Crack 2025 Free
Python is a high-level, interpreted programming language
Lecture 5 Software Requirement Engineering
Airline CRS | Airline CRS Systems | CRS System
The Dynamic Duo Transforming Financial Accounting Systems Through Modern Expe...
most interesting chapter in the world ppt
4Seller: The All-in-One Multi-Channel E-Commerce Management Platform for Glob...
MLforCyber_MLDataSetsandFeatures_Presentation.pptx
GSA Content Generator Crack (2025 Latest)
Tech Workshop Escape Room Tech Workshop
Modern SharePoint Intranet Templates That Boost Employee Engagement in 2025.docx
Introduction to Ragic - #1 No Code Tool For Digitalizing Your Business Proces...
Computer Software - Technology and Livelihood Education
EaseUS PDF Editor Pro 6.2.0.2 Crack with License Key 2025
Topaz Photo AI Crack New Download (Latest 2025)
Full-Stack Developer Courses That Actually Land You Jobs
DuckDuckGo Private Browser Premium APK for Android Crack Latest 2025
UTEP毕业证学历认证,宾夕法尼亚克拉里恩大学毕业证未毕业
How to Odoo 19 Installation on Ubuntu - CandidRoot
CCleaner 6.39.11548 Crack 2025 License Key
Download Adobe Photoshop Crack 2025 Free

How to Solve the Top 3 Struggles with Identity Governance and Administration (IGA)

  • 1. Identity Governance and Administration (IGA) What are the top problems?
  • 2. What are the Top 3 Problems in IGA? 1. Visibility into access o Do you really have the right access? How has an employee’s access changed over their lifecyle within the organization? Typically, the longer you’re here, the more access you accumulate. 2. Third Party User Management: o It’s the Wild West when it comes to managing contractors… 3. Certifying Access: o We want to do more access reviews, but it’s so time consuming that only the minimum reviews are being done.
  • 3. 1. Visibility into access: What’s Right? How do we assign roles and entitlements? Time with the company Amountofentitlements Entitlement ‘creep’: • How do you manage this? • How do justify removing entitlements?
  • 4. 1. Visibility into access: What’s Right? How do we assign roles and entitlements? Issues with this approach: • Are the starting roles even right? • How do you know you haven’t over- or under- provisioned? • Are the people getting these roles similar enough? User 1 Department: A User 2 Department: A New User 3 Department: A Amount of matches in entitlements: 10/10 Percentage: 100% Good match for new User Role Conventional Approach:
  • 5. What’s Right? Optimal Approach: Visual Grouping: A system that allows automatic grouping of like entitlements; roles are seen as overlays to incoming data
  • 6. Available Entitlements 2. Third Party User Management HR System IGA System X Open Accounts: Preferred targets for criminal operators
  • 7. May June July August September October November 3. Certifying Access How do I review so many entitlements? Certification review Cycle Timeneededforreview Entitlements per Employee Manager Employees Why so much time needed to run Certifications?
  • 8. This is what a Manager has to review… “Where do I even start, and when will I have time for this? Answer: Let’s make things easier…
  • 10. Summary 1. Visibility into access o Typically, the longer you’re here, the more access you accumulate. o Answer: Keep visibility into entitlement growth by instituting an IGA program that continuously monitors entitlements and provides an easy visualization into the state of the business. 2. Third Party User Management: o It’s the Wild West when it comes to managing contractors… o Answer: Incorporate contractors into your IGA program/suite. This ensures continual vigilance and reduction of your attack surface area. 3. Certifying Access: o We want to do more access reviews, but it’s so time consuming that only the minimum reviews are being done. o Answer: Make things easier for your reviewers; provide them the tools necessary to perform quick reviews!
  • 11. THANK YOU! © 2018 by SecureAuth + Core Security All rights reserved