• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Protection of Information Assets

Temple University

Protection of Information Assets

MIS 5206.001 ■ Fall 2023 ■ David Lanter
  • HomePage
  • Instructor
  • Syllabus
  • Schedule
    • First Half of the Semester
      • Unit #1: Understanding an Organization’s Risk Environment
      • Unit #2: Case Study 1 – Snowfall and stolen laptop
      • Unit #2: Data Classification Process and Models
      • Unit #3: Risk Evaluation
      • Unit #4 Case #2: Autopsy of a Data Breach: The Target Case
      • Unit #5: Creating a Security Aware Organization
      • Unit #6: Physical and Environmental Security
    • Second Half of the Semester
      • Unit #8 Case Study 3 – A Hospital Catches the “Millennium Bug”
      • Unit #9: Business Continuity and Disaster Recovery Planning
      • Unit #10: Network Security
      • Unit #11: Cryptography, Public Key Encryption and Digital Signatures
      • Unit #12: Identity Management and Access Control
      • Unit #13: Computer Application Security
  • Deliverables
    • Weekly Deliverables
      • “In the News” Articles
      • Answers to Reading Discussion Questions
      • Comments on Reading Discussion Question and Other Students’ Answers
    • Case Studies
    • Team Project

Question 2

November 9, 2023 by David Lanter 21 Comments

Why is it important to a business to care about the difference between identity management and access management?

Filed Under: Unit 12: Identity Management and Access Control Tagged With:

Reader Interactions

Comments

  1. Ooreofeoluwa Koyejo says

    November 12, 2023 at 1:56 pm

    Distinguishing between Identity Management (IDM) and Access Management (AM) is vital for businesses as there are people (users) who do the work in a business. IDM establishes a secure user governance foundation by managing user identities, reducing the risk of unauthorized access and data breaches. Recognizing these distinctions is crucial for regulatory compliance, aligning business practices with industry regulations. Access Management aids in resource optimization by judiciously allocating permissions, preventing unrequired access to sensitive data. It establishes a centralized management of user information, ensuring consistency and simplifying access management. Understanding the distinctions between both will inform the controls and measures implemented to achieve a seamless user experience and proactive security management through monitoring and logging capabilities.

    Log in to Reply
    • Celinemary Turner says

      November 14, 2023 at 7:49 am

      Hi Ooreofeoluwa,
      The emphasis on IDM reducing the risk of unauthorized access and data breaches is essential. With the increasing frequency and sophistication of cyber threats, effective IDM becomes a critical component in an organization’s cybersecurity strategy.

      Log in to Reply
  2. Bo Wang says

    November 12, 2023 at 2:43 pm

    Identity management encompasses the broader processes of creating, maintaining, and retiring digital identities. It includes user provisioning, authentication, authorization, and identity synchronization. Access management is a subset of IDM and specifically focuses on controlling and managing user access to resources. It involves access control, authentication, Single Sign-On, and session management. Identity management deals with the overall management of digital identities, while Access management concentrates on regulating user access to specific resources.

    Log in to Reply
    • Bo Wang says

      November 12, 2023 at 2:45 pm

      Ignore it, that sent the wrong way

      Log in to Reply
  3. Bo Wang says

    November 12, 2023 at 2:57 pm

    Both IDM adn Am is important to bussiness because ID ensures that the right individuals have appropriate digital identities and that their information is accurate. It helps prevent unauthorized creation or use of identities. And AM focuses on controlling and managing user access to resources. Proper access controls help prevent unauthorized access, reducing the risk of data breaches and other security incidents.

    Log in to Reply
    • Jon Stillwagon says

      November 14, 2023 at 10:06 pm

      Bo, without identity management and access management it can be difficult to figure out who is on your system. It would also be difficult to find what kind of device they are using to get on that system. It lets us know how the business can proceed with finding a solution that is on their system from a different device or at a different location.

      Log in to Reply
  4. Yannick Rugamba says

    November 12, 2023 at 3:25 pm

    It is important for businesses to understand the distinction, between Identity and Access Management. Identity Management focuses on verifying the identity of users while Access Management controls their permissions and actions. This differentiation plays a role in enhancing security by preventing access ensuring compliance with regulations such as HIPAA improving operational efficiency and enhancing the user experience. Additionally, it facilitates cost allocation of resources. Offers the flexibility to adapt to evolving business requirements. In short it revolves around ensuring that the right individuals have access levels while striking a balance, between security and functionality

    Log in to Reply
    • Celinemary Turner says

      November 14, 2023 at 7:57 am

      Yannick,
      i agree with you. The connection between IDM and AM and their role in improving operational efficiency is noteworthy. By streamlining identity verification and access control processes, businesses can reduce the time and effort spent on managing user credentials and permissions.

      Log in to Reply
  5. Celinemary Turner says

    November 12, 2023 at 6:50 pm

    Understanding the difference between Identity Management (IDM) and Access Management (AM) is crucial for businesses due to the following reasons:
    Security Enhancement: IDM ensures the accuracy and consistency of user identities while AM manages and controls access to resources based on those identities. By understanding this difference, businesses can implement a holistic security strategy. IDM ensures that only legitimate users are granted access, while AM ensures that their access is appropriately restricted, reducing the risk of unauthorized access and potential security breach.
    Compliance Adherence IDM Supports compliance by managing and auditing user identity-related processes. In comparison, AM enforces access control policies to align with regulatory requirements. A clear distinction between IDM and AM helps design and implement measures that meet compliance standards, such as GDPR, HIPAA, or PCI DSS.
    Risk Mitigation: IDM ensures accuracy and consistency in user identities. While AM Controls permissions and tracks user activities. By managing identity and access separately, businesses can reduce the risk of identity-related errors and unauthorized access. A well-designed IDM and AM strategy contributes to a more resilient security posture, safeguarding against internal and external threats.
    Cost Efficiency: IDM streamlines administrative tasks, reducing the likelihood of errors.while AM efficiently accesses provisioning and de-provisioning. Understanding the distinction helps in optimizing IAM processes reducing the administrative burden. This enhances security and contributes to cost efficiency by minimizing manual efforts and potential errors in user identity and access management.
    Recognizing the nuances between IDM and AM enables businesses to implement a robust Identity and Access Management (IAM) strategy that addresses security, compliance, efficiency, user experience, risk, and cost considerations effectively.

    Log in to Reply
    • Bo Wang says

      November 13, 2023 at 9:31 pm

      I agree with your comment that IDM and AM are designed to determine identity and the resources that identity can manipulate.

      Log in to Reply
  6. Jon Stillwagon says

    November 12, 2023 at 8:24 pm

    The reason it is important for a business to care about the difference between identity management and access management is to better protect its services. It allows the business to get a better understanding of who is getting into the system and what they are getting into the system with. In some instances when someone tries to get into some service with a device that is not recognized you usually get a message asking you if this is you because they are trying to protect your information as a user. It helps protect your company’s information because it shows where the device is being logged into if it is in a place that isn’t in your local area then you should be worried only if it isn’t you. If the business recognizes a potential threat trying to get into their system they can deny them access from ever getting in.

    Log in to Reply
    • Celinemary Turner says

      November 14, 2023 at 8:06 am

      Yes, Jon, I agree with your point mentioned. Receiving messages when someone attempts to access a service with an unrecognized device highlights the importance of user verification.

      Log in to Reply
    • Eyup Aslanbay says

      November 14, 2023 at 9:41 pm

      It is very clear why businesses need to understand the difference between identity management and access management. It succinctly explains how this knowledge helps in better protecting services and sensitive information.

      Log in to Reply
  7. Edge Kroll says

    November 12, 2023 at 9:35 pm

    Businesses today must be informed about the differences between identity and access management. Proper identity management ensures accurate user information, reducing the risk of unauthorized access and helping maintain compliance with regulations. Access management complements this by controlling permissions, preventing data breaches, and adhering to the principle of least privilege, where users are granted the minimum access needed for their roles. The distinction enables businesses to implement comprehensive security measures, safeguard sensitive data, and uphold overall operational integrity by addressing both the creation and maintenance of digital identities and the regulation of user permissions.

    Log in to Reply
    • Yannick Rugamba says

      November 13, 2023 at 8:01 pm

      Hey Edge, your explanation of identity and access management is really good. Maybe you could also mention how they affect the user experience and operational flexibility? For instance when identity processes are streamlined it allows users to access things faster and controlled access rights can make workflows more efficient. This would give a understanding of their advantages in a business environment.

      Log in to Reply
  8. Hashem Alsharif says

    November 12, 2023 at 11:54 pm

    It’s crucial for a difference to care about the difference between identity management and access management because these are essential for the security of a company. The main point of access management is it controls who has access to what area, and by not being able to recognize this, it makes vulnerable information accessible to more users. It’s just as important to be well versed in identity management since companies must be able to maintain and distinguish between each user. By implementing both of these properly, they are mitigating risk of improper use, they also do a better job of running the business smoothly.

    Log in to Reply
    • Nicholas Nirenberg says

      November 14, 2023 at 12:32 pm

      I agree that understanding the crucial distinction between identity management and access management is essential for a company’s security. Access management controls area-specific access, preventing vulnerable information exposure. Proficiency in identity management is equally vital for user maintenance. Implementing both effectively mitigates improper use risks and ensures smoother business operations, a viewpoint I agree with.

      Log in to Reply
  9. Nicholas Nirenberg says

    November 13, 2023 at 11:54 pm

    The distinction between identity management and access management is of paramount importance to businesses due to its role in establishing a robust security infrastructure. Identity management focuses on the verification and authentication of individuals accessing digital systems, ensuring accurate user identities. On the other hand, access management concentrates on regulating and controlling the permissions granted to authenticated users, aligning access with their roles and responsibilities. This differentiation enables organizations to implement precise security measures, streamline user provisioning and de-provisioning processes, and adhere to compliance requirements. Effectively managing these aspects contributes to a more secure, efficient, and compliant digital environment for the business, reducing the risk of unauthorized access and potential data breaches.

    Log in to Reply
    • Edge Kroll says

      November 14, 2023 at 10:28 pm

      Hi Nicholas,

      By focusing on accurate user verification and authentication, identity management establishes a secure foundation. Access management then aligns access with roles and responsibilities. This differentiation not only enhances security but also streamlines user processes and facilitates compliance adherence. Overall, effectively managing these aspects contributes to a more secure, efficient, and compliant digital environment, mitigating the risk of unauthorized access and data breaches. Well-articulated points!

      Log in to Reply
  10. Eyup Aslanbay says

    November 14, 2023 at 2:00 pm

    Identity Management focuses on accurately identifying and managing user identities, which is essential for security and regulatory compliance. Access Management controls what resources users can access, playing a critical role in protecting sensitive data and ensuring users have the necessary access to perform their jobs effectively. This distinction helps businesses in implementing targeted security measures, improving user experience, and managing risks more effectively, all of which are vital for maintaining a secure, compliant, and efficient operational environment.

    Log in to Reply
    • Jon Stillwagon says

      November 14, 2023 at 10:28 pm

      Eyup, that is very true it can even help with efficiency in the workplace. It can help eliminate possible threats from getting into the system which will reduce the amount of workload that someone will have by creating a set of parameters that will allow the person access to the system if they are nearby or on a designated device that the company has issued or allowed.

      Log in to Reply

Leave a Reply Cancel reply

You must be logged in to post a comment.

Primary Sidebar

Weekly Discussions

  • Unit 01: Understanding an Organization's Risk Environment (5)
  • Unit 02: Case Study 1 – Snowfall and a stolen laptop (2)
  • Unit 02: Data Classification Process and Models (6)
  • Unit 03: Risk Evaluation (6)
  • Unit 04: Case Study 2 – Autopsy of a Data Breach – The Target Case (4)
  • Unit 05: Creating a Security Aware Organization (6)
  • Unit 06: Physical and Environmental Security (6)
  • Unit 08: Case Study 3 – A Hospital Catches the "Millennium Bug" (3)
  • Unit 09: Business Continuity and Disaster Recovery (6)
  • Unit 10: Network Security (6)
  • Unit 11: Cryptography, Public Key Encryption and Digital Signature (6)
  • Unit 12: Identity Management and Access Control (6)
  • Unit 13: Computer Application Security (6)
  • Welcome (1)

Copyright © 2025 · Course News Pro on Genesis Framework · WordPress · Log in