Identity at the Center

Identity At The Center #16: The IAM Garbage Plate

Oct 11, 2019
Jim and Jeff serve up a metaphorical garbage plate of IAM topics inspired by their Rochester visit. They debate using ITSM tools for access requests while addressing the shortcomings of ITSM in identity governance. Key elements of an effective access catalog are outlined, and the importance of business ownership over access decisions is emphasized. They also tackle challenges like Active Directory migrations and the necessity of automating entitlement onboarding. Amidst this, they stress the critical role of IAM in mitigating breach risks.
Ask episode
AI Snips
Chapters
Transcript
Episode notes
ANECDOTE

Garbage Plate Metaphor For The Episode

  • Jim and Jeff describe the Rochester "garbage plate" as a mix of favorites and meats with hot sauce.
  • They use it as a metaphor for today's show: a mixed plate of IAM topics.
ADVICE

Don't Rely On ITSM As Your Identity Source

  • Use a dedicated identity governance system, not just ITSM, to get a complete picture of user access across systems.
  • Integrate ITSM with IGA so requests flow but the IGA remains the source of truth for who has access to what.
ADVICE

Translate Entitlements And Assign Owners

  • Standardize and translate technical entitlement names into business-friendly descriptions before adding them to the access catalog.
  • Assign a business owner to every entitlement to manage approvals and reviews.
Get the Snipd Podcast app to discover more snips from this episode
Get the app