In an increasingly complex digital landscape where cyberattacks are on the rise, identity management has become a major challenge for businesses. Once centralised, identities are now scattered across multiple systems, making access control more complicated and heightening security risks. Strengthening cybersecurity inevitably requires effective Identity and Access Management (IAM). This issue is at the heart of many discussions among industry experts. How can these identities be secured in an ever more fragmented ecosystem? What strategies should be adopted to mitigate threats? Cybersecurity and IAM: What are the challenges, interconnections and solutions?

An Increasingly Fragmented Identity Ecosystem

With the widespread adoption of cloud computing (various servers accessible via the Internet), remote work, and hybrid architectures (environments combining distinct private and public cloud infrastructures, for example), identity management has become increasingly complex. Previously centralised in internal systems, identity data is now scattered across multiple systems, databases, and SaaS applications. A SaaS application (Software as a Service) is software hosted in the cloud and accessible via the Internet without local installation, such as Google Workspace, Microsoft Office 365, or Salesforce.

"Identities are no longer static; they continuously evolve within distributed environments. Without clear governance, we end up with identity silos that weaken overall security," says Cyril GOLLAIN, Managing Director EMEA at Radiant Logic. This fragmentation makes it challenging to ensure consistent access control and increases risks in case of security flaws. In response, it is crucial to unify and structure user information to ensure controlled and secure access. The goal is to grant employees, partners, and machines only the rights strictly necessary for their roles, nothing more, nothing less. This approach, known as the "principle of least privilege" mitigates risks by limiting exposure to sensitive resources.

 

Data Hygiene and Reduction of Attack Surfaces

Another major challenge concerns user account management. When an employee leaves the company or a contractor completes their assignment, their access must be revoked immediately. However, in many organisations, these accounts remain active for months or even years, creating potential entry points for cyberattacks. "Each unmanaged account is a potential open door. The first reflex should be to identify and remove obsolete access to minimise risks," adds Cyril GOLLAIN.

This rigor is part of the "Zero Trust" approach, a cybersecurity model based on a simple idea: never grant access by default, always verify the identity and context of an access request before allowing it. In practice, this means that even within the company's network, every connection is controlled and monitored. For example, a user connecting from an unusual device or location may be subject to additional verification. This approach significantly reduces the risks associated with compromised identities or distorted access.

TRUSTECH's Chairman Guy de Felcourt listening to speakers on stage during a conference on cybersecurity and IAM (identity and access management)TRUSTECH ID Conference Room with our Chairman Guy de Felcourt

IAM Evolution towards Proactive Cybersecurity

IAM (Identity and Access Management) is a set of technologies, processes, and policies designed to manage users and their access rights to an organisation's resources. Its goal is to ensure that only authorised individuals or systems can access the appropriate data and applications, while ensuring security and compliance. IAM includes features such as authentication, authorisation, identity management, and access monitoring. The rise in cyber threats has led to the emergence of new solutions that combine IAM and cybersecurity. Two key concepts at the heart of expert discussions: Identity Threat Detection & Response (ITDR) and Identity Security Posture Management (ISPM).

ITDR (Identity Threat Detection & Response) focuses on detecting suspicious behavior related to identities. It helps identify abnormal activities, such as an employee attempting to access sensitive files he has never interacted with before. "We are no longer just talking about identity management, but about identity cybersecurity". This system continuously analyses user actions and alerts in the event of a potential threat. On the other hand, ISPM (Identity Security Posture Management) aims to strengthen the security posture of identities by identifying vulnerabilities and poor practices in advance. For example, it can spot accounts with excessive privileges or overly permissive access configurations. By applying strict controls and optimising rights management, ISPM helps minimise risks even before a threat arises.

Faced with increasingly strict regulations and ever more sophisticated threats, IAM can no longer be considered just as a technological subject. It must be integrated at the heart of an organisation's cybersecurity strategy. At the TRUSTECH 2024 conference, which focused on this topic, the need for a comprehensive approach combining identity governance, access control, and threat detection was emphasised. In the future, companies will need to invest in smarter and more interconnected solutions to ensure identity management meets the challenges of modern cybersecurity.