In 2024, digital identity verification has become an integral part of our online activities, from simple shoe purchases to complex business operations. However, traditional approaches to identity and access management are struggling to keep up with the demands of seamless migration, diverse identity sources, and varying workflows. High time for organizations to introduce a trailblazing solution: identity fabrics.
In this article, we – Christian Egli, IAM architect with SBB, and Olivier Pallière, Principal Identity Architect with Adnovum – will unveil the key indicators about when and how to adopt an identity fabric for your company. You cannot only expect an exploration of the motivations, challenges, and advantages that accompany an identity fabric. You will also gain a solid understanding of the distinctive features that set identity fabrics apart from classical IAM solutions.
An identity and access management (IAM) strategy is a structured framework of policies, processes, and technologies that organizations use to manage digital identities and their access to company assets.
In today’s increasingly digital world, IAM has become a critical part of an organization’s security posture, as it helps protect sensitive data and systems from unauthorized access. After all, compromised user credentials are known to be the most common targets of attackers.
An IAM strategy consists of the following key components, or pillars:
An IAM strategy brings significant benefits such as reducing the risk of data breaches and thus helping improve compliance, efficiency through automation and ultimately global productivity.
Like all enterprise architecture elements, developing an IAM strategy is an iterative process. It should comprise the following steps:
«IAM has become a critical element of any business, leading to new security challenges. In addition to security, topics such as governance, audit, scalability, monitoring, and integration must be infused in an IAM strategy.» Olivier Pallière |
|
We’ve seen that IAM has become a critical element of any business, as we are moving away from the traditional IT security where it was possible and normal to rely on firewalls and dedicated security components. Today most every service is out in the open, i.e., publicly available. This is true for customer applications but also becoming a reality for a lot of enterprise clients using cloud services like Microsoft Office 365, Trello, or a Miro Board. While firewalls are still used to protect the infrastructure running those services, the apps themselves are not protected.
As a result, an IAM strategy has to address many new use cases and threats, leading to new security challenges. However, security is just one area of an IAM strategy. Governance, audit, scalability, monitoring, and integration are a non-exhaustive list of important topics that must be infused in an IAM strategy. Depending on what is deemed a «must» requirement in the IAM objectives and capabilities, it is possible to classify those challenges.
Here are a few examples we’ve seen in numerous real projects:
It primarily requires a mindset change to introduce a holistic approach to IAM as a central element of a security posture. When you do, focus on:
Collaboration between the different actors within an organization is key to ensure scalability and address potential pitfalls. One of them is shadow IT, i.e., the use of unauthorized or unapproved applications, software, or technology solutions, which can result in security and compliance risks. Such unmanaged technologies might not adhere to the organization’s security standards, potentially leading to data breaches.
A current trend used to significantly improve an IAM strategy and address modern challenges is identity fabric.
Identity fabric, at its core, is a cutting-edge concept and methodology revolutionizing IAM. Functioning as a high-level architectural framework within IAM, identity fabric takes a centralized approach to deliver a comprehensive overview of all users and their access privileges. This unified perspective not only simplifies identity management but also bolsters identity security by minimizing the potential for unauthorized access. Essentially, identity fabric enables the strategic design of logical IAM infrastructures for enhanced efficiency and security.
Modern applications are no longer big monolithic blocks but rather relying on a multitude of micro services organized in a service mesh working together. And each of those services needs access to identity data. This should be represented in a unified way, ensuring consistency throughout an organization and allowing for centralized visualization and identity management.
The following table compares traditional IAM with the identity fabric concept:
Traditional IAM | Identity fabric | |
Decentralized |
Centralized |
|
History-based view |
Holistic up-to-date view |
|
Individual risk assessment |
Overall risk assessment |
|
Silo-based |
Collaborative |
|
Shifting from a traditional IAM to an identity fabric is a strategic move for your organization. Here is a breakdown of the 5-step process to get started:
«Improving your IAM is about the big picture, seamless integration, and strategy. There are specific indicators that tell you when it’s time to act: e.g., the need for a central policy layer and global dashboard, an inconsistent access model, or overloaded IAM teams.» Christian Egli |
|
Drawing from my personal experience as the IAM architect at SBB, I have identified six key indicators that have emerged as the crucial elements of identity fabric. In the following sections I am going to elaborate on each of these indicators:
Indicator 1: Need for a central and consistent policy layer
Recently, a senior cyber security executive asked me to explain all the access policies in our IAM landscape within a 10-minute appointment. I was overwhelmed by the request as we have numerous policies covering various aspects such as customer and workforce identities, authentication, credential management, and role-based and attribute-based access control. It was impossible to cover everything in such a short time.
Despite my initial attempt to brush off the request, I recognized the importance of his question. Managing policies across various building blocks necessitates an overarching central policy layer that can be centrally controlled and decentrally enforced. It's not just about individual policies; it's about the bigger picture.
Therefore, I recommend asking your responsible IAM staff to provide a concise explanation of IAM policies within 10 minutes. If they struggle to do so, it may be an indication that adopting identity fabric patterns is necessary.
Indicator 2: Need for a global dashboard
Let's discuss privileged access and its importance, including critical accounts like Global Admin and root. When managing IAM, we often focus solely on our IAM landscape. However, when it comes to privileged access, we must consider our cloud environments, which host numerous Kubernetes clusters and a significant portion of our applications. Engineers administering these infrastructures also wield privileged access. And while our cloud environments are automated through pipelines, we still need individuals with privileged access to our CI/CD environments.
Merely controlling privileged access in individual subsystems is inadequate. We need a centralized dashboard to visualize gaps, overlaps, and identify overprivileged accounts. Ideally, this dashboard would generate heatmaps and offer recommendations to address these issues efficiently.
Now let's delve into integration. While Lego bricks seamlessly integrate across generations, our IAM infrastructure's building blocks aren't always as compatible.
Indicator 3: Inconsistent access model
For legacy applications, partners from other companies are required to use an SBB account. However, as we introduce new SBB business applications, these partners can use their own company accounts with single sign-on through identity federation. This mix of accounts highlights the inconsistency in our access model, which partners notice even from the outside.
Indicator 4: Different approaches to deal with machine or workload identities
Another indicator of incomplete integration is the varied approaches we have for handling machine or workload identities. We currently obtain certificates from different PKIs, while OAuth2 is increasingly used through our API management platform. This lack of a clear decision-making basis for developers and architects, along with the difficulty for IAM and security managers to maintain an overview, further demonstrates the need for improved integration.
By addressing these indicators, we can work towards achieving a more seamless and unified IAM infrastructure.
An important indicator that you should adopt an identity fabric is the workload of your IAM team. The ones at SBB had been suffering from a very high workload for years. This is why we invested heavily in automation, from self-services to automated governance processes, to optimize our IAM resources and efficiency.
A key point for us was the transformation of our IAM team from pure operations to DevOps teams and assigning an increasing number of software developers to it. Software developers come with a different mindset that is essential for adopting an identity fabric: It's more than just problem-solving. It’s about strategic development, automation, and implementing all the integration tasks mentioned in indicators 3 and 4.
Indicator 6: Cross-domain integration
Identity and access management is extending its reach into various other domains, as the graphic below shows. For instance:
It is important to note that these teams have different priorities, with information security not being their primary focus. This is where the IAM architect plays a vital role and takes on the responsibility. Adopting an identity fabric helps identify and bridge organizational gaps, enabling a seamless and secure IAM experience.
Digital identities are here to stay. We just learned what the pillars and the challenges of an IAM strategy are and how to develop such a strategy. Yet, in this increasingly digital world this is not enough to keep your organization safe. If the 6 indicators described above reflect your organization’s current state, you definitely need to delve into the topic of identity fabrics. Remember: identity fabrics stand for a holistic view of all users and privileges, easier risk assessment, as well as secure, seamless and controlled access to every service for any identity.
Identity fabrics are the technology of choice to prepare for future challenges.