

Identity At The Center #4: The Circle of (IGA) Life
78 snips Jul 26, 2019
Discover the lifecycle of identity governance, exploring the stages of approval, provisioning, collection, and verification. The hosts dive into the challenges of managing identities in diverse user populations, emphasizing structured approval processes and risk management. They also highlight the balancing act needed between automation and manual provisioning. Security risks tied to legacy accounts are discussed, alongside the importance of real-time analytics for effective access management. Tune in for insights on enhancing identity management practices!
AI Snips
Chapters
Transcript
Episode notes
Closed Loop in Identity Governance
- Identity administration can become out of sync if shadow/backdoor administration happens in end systems.
- Maintaining a closed loop cycle ensures "what should be" and "what actually is" stay aligned.
Approvals Vary by Identity Type
- Approvals can be either physical or implied, depending on identity type and risk level.
- Employee identities typically have authoritative sources; non-employees often have less mature processes.
University Low-Risk Access Example
- Universities might allow community members to self-register for low-risk access such as library cards.
- This creates an implied approval with limited access and low associated risk.