• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Protection of Information Assets

Temple University

Protection of Information Assets

MIS 5206.701 ■ Fall 2024 ■ David Lanter
  • HomePage
  • Instructor
  • Syllabus
  • Schedule
    • First Half of the Semester
      • Unit #1: Understanding an Organization’s Risk Environment
      • Unit #2: Case Study 1 – Snowfall and stolen laptop
      • Unit #2: Data Classification Process and Models
      • Unit #3: Risk Evaluation
      • Unit #4 Case #2: Autopsy of a Data Breach: The Target Case
      • Unit #5: Creating a Security Aware Organization
      • Unit #6: Physical and Environmental Security
    • Second Half of the Semester
      • Unit #8 Case Study 3 – A Hospital Catches the “Millennium Bug”
      • Unit #9: Business Continuity and Disaster Recovery Planning
      • Unit #10: Network Security
      • Unit #11: Cryptography, Public Key Encryption and Digital Signatures
      • Unit #12: Identity Management and Access Control
      • Unit #13: Computer Application Security
  • Deliverables
    • Weekly Deliverables
      • “In the News” Articles
      • Answers to Reading Discussion Questions
      • Comments on Reading Discussion Question and Other Students’ Answers
    • Case Studies
    • Team Project
  • Zoom link

Question 2

November 6, 2024 by David Lanter 28 Comments

Why is it important to a business to care about the difference between identity management and access management?

Filed Under: Unit 12: Identity Management and Access Control Tagged With:

Reader Interactions

Comments

  1. Christopher Williams says

    November 8, 2024 at 10:18 am

    Understanding the difference is important because it allows a business to create more secure and efficient systems. Proper identity management helps ensure that only authorized individuals can access systems, while access management enforces restrictions to protect sensitive information and prevent unauthorized activities. By understanding them both, businesses can reduce security risks, and improve regulatory compliance.

    Log in to Reply
    • Tache Johnson says

      November 10, 2024 at 10:58 am

      I agree that identity and access management must be separated for security. Focusing on both may simplify processes by giving staff the access they need no more, no less. Should firms spend equally in identity and access management, or should one be prioritized? I think these are difficult to balance yet essential for security.

      Log in to Reply
  2. Ericberto Mariscal says

    November 8, 2024 at 7:11 pm

    It is important to care about the difference between identity management and access management because they work hand in hand to provide a layer of security around digital identities. For example, IM ensures that only authenticated users are identified and allowed in the system, and AM controls what the authenticated users are able to access in the system. This ensures that the user is only able to access the resources and data that they are permitted to access. It adds a level of protection, in the sense that if a user’s credentials are compromised, the attacker is not able to easily navigate through the enterprises network.

    Log in to Reply
    • James Nyamokoh says

      November 9, 2024 at 10:19 pm

      Hi Eric,

      I agree with your point that understanding the difference between identity management (IM) and access management (AM) is essential for building a secure environment. You’ve highlighted well how IM authenticates users while AM limits what they can access, creating a layered security approach. An additional perspective to consider is that while AM can restrict access, strong monitoring and alerting are also crucial; if an attacker does gain access with compromised credentials, timely detection and response are key to limiting potential damage. In a world where threats are constantly evolving, organizations may benefit from not only controlling access but also actively tracking and responding to unusual user behavior. Great post.

      Log in to Reply
      • Ericberto Mariscal says

        November 12, 2024 at 7:07 pm

        Hi James,

        You’ve raised a great point about the importance of monitoring and alerting, in this constantly evolving threat landscape, it’s not enough to just control access, we also need to have mechanisms in place to detect and respond to any potential threats.

        Log in to Reply
  3. Nelson Ezeatuegwu says

    November 8, 2024 at 8:30 pm

    It is important for a business to care about the difference between identity management and access management because Authentication and Authorization preserves data confidentiality and integrity. Authentication verifies users and digital identities; ensuring that unauthorized users can not alter data integrity, it ensures that data integrity is preserved during transmission. Access management strictly delegates permission (read, write, delete) to users, minimizing the risk of unauthorized access to sensitive data. It gives permissions and privileges to the right users according to their roles and responsibilities, thereby preserving the confidentiality of data.

    Log in to Reply
    • Neel Patel says

      November 11, 2024 at 4:25 pm

      Hi Nelson! Great response – I have a question to post to encourage discussion. How do authentication and authorization complement each other in securing a business’s data? I like how effectively and thoroughly responded to the question, so I am interested in your perspective.

      Log in to Reply
      • Nelson Ezeatuegwu says

        November 11, 2024 at 6:23 pm

        Hi Neel
        Authentication and authorization work hand in hand in protecting business’s data. Authentication comes first because it verifies and validates the identity. Authorization determines the user’s privileges once the identity is verified. the two steps ensures that the integrity and confidentiality of business’s data is secured.

        Log in to Reply
  4. Vincenzo Macolino says

    November 9, 2024 at 4:38 pm

    It is important for a business to care about the difference between identity management and access management because it creates a safer work environment and protects employees and the organization. Authentication is a key point of identity management and it is important that an organization is able to recognize that authentication is essential for verifying employees and protecting data from being altered. Caring about the difference between this and access management is crucial because access management creates permissions for employees access to sensitive data, but it does not authenticate what users should and shouldn’t have access.

    Log in to Reply
    • Tache Johnson says

      November 10, 2024 at 11:01 am

      You made a good argument about how identity management authentication verifies system access while access management limits their capabilities. Understanding this distinction makes labor safer and more organized. Do you believe corporations skip one of these regions for the other? It’s interesting to think about how a mix between the two could affect safety as a whole.

      Log in to Reply
      • Vincenzo Macolino says

        November 12, 2024 at 5:55 pm

        Hey Tache, I definitely think that some organizations will skip over identity management or access management for a few reasons. Some businesses are small and may only have a few employees and do not feel the need to control who has access to certain information as they think it does not matter. Another reason could be cost or just laziness in general. Some organizations do not factor in employee misconduct when looking at their risks, this would suggest that some organizations do not bother with access management.

        Log in to Reply
        • Benjamin Rooks says

          November 12, 2024 at 6:53 pm

          This is an important distinction to make, smaller businesses may assume that because someone is using a specific login that they are that person. Obviously as security professionals we realize that might not be the case and it could be a bad actor with stolen credentials.

          Log in to Reply
  5. James Nyamokoh says

    November 9, 2024 at 9:56 pm

    It is essential for businesses to distinguish between identity and access management to ensure both accurate user verification and appropriate permission enforcement. Properly managed identities prevent unauthorized users from entering the system, while controlled access rights mitigate the risk of data breaches by restricting user activities to essential functions. This layered approach protects critical assets and ensures compliance with regulatory standards.

    Log in to Reply
  6. Tache Johnson says

    November 10, 2024 at 10:20 am

    Identity management and access management are two different things that businesses need to know about because each is important for keeping resources safe and making sure processes are safe. Identity management checks user IDs to allow only authorized users access the system. However, access management limits user rights by role or requirement. Businesses may prevent unwanted access, reduce internal and external security risks, and comply with data protection laws by separating these procedures. This multilayered approach to security helps keep private data safe, stops data breaches, and protects company property, letting workers access what they need without putting important resources at risk.

    Log in to Reply
  7. Benjamin Rooks says

    November 10, 2024 at 1:22 pm

    Because without identity management there is no way to control who has access to the system. It is the first step to putting access control measures in place. I would argue that even though the definition of identity management is using methods to determine who is accessing a system, even without using identification methods companies still assume that they know who is accessing a system. For example if you are giving a specific computer access to a jump server you are assuming that the owner of that computer is an authorized user. In reality though as security professionals we know that that is not always the case. IP spoofing, credential and physical theft, these and many other techniques can be easily utilized to get around access management controls without proper identity management.

    Log in to Reply
  8. Andrea Baum says

    November 10, 2024 at 4:05 pm

    Recognizing the distinction between identity management and access management is vital for businesses to enhance security, improve operational efficiency, and ensure compliance. Identity management confirms user identities, while access management regulates their access based on roles. This separation minimizes unauthorized access risks and enables smooth onboarding and role adjustments. A well defined identity and access strategy also supports regulatory compliance, protecting both company assets and reputation.

    Log in to Reply
    • Cyrena Haynes says

      November 12, 2024 at 8:27 pm

      I agree with your points on the importance of separating identity and access management to strengthen security and streamline operations. By keeping identity management focused on verifying and maintaining user identities, while access management adapts permissions based on roles, businesses can reduce the likelihood of unauthorized access. This distinction also plays a crucial role in compliance, as it ensures that access to sensitive data is tightly controlled and meets regulatory standards. Additionally, a clear strategy around identity and access management can simplify processes like onboarding and role transitions, enhancing efficiency and user experience.

      Log in to Reply
  9. Dawn Foreman says

    November 10, 2024 at 4:45 pm

    A business must recognize the difference between identity management and access management as they are different management processes but are complimentary. Understanding the difference will lead to more effective and enhanced security practices. Identity management is essentially authorization of a user. Acess control defines what acess that user has. If a company does not have a clear distinction between the two, this is a vunerability that could lead to unauthorized access.

    Log in to Reply
  10. Neel Patel says

    November 10, 2024 at 5:40 pm

    Understanding identity and access management is essential for a business, as it enhances overall security, operational efficiency, and compliance. Identity management focuses on verifying who a user is by ensuring that only recognized individuals are part of the organization. While access management controls what each user is allowed to do within systems, data, or applications. This distinction is critical because it helps businesses implement a principle of least privilege, ensuring that employees only have access to the data and resources necessary for their roles. By clearly defining identity and access protocols, companies can minimize risks such as data breaches, unauthorized access, and potential misuse of sensitive information. Furthermore, these practices support compliance with industry regulations, making it easier for businesses to maintain secure and reliable environments while meeting legal and ethical standards. Not having a clear distinction between the two can run into vulnerabilities like unauthorized access.

    Log in to Reply
    • Andrea Baum says

      November 12, 2024 at 5:46 pm

      I completely agree that distinguishing between identity and access management is essential for security and compliance. Clear protocols for each not only reduce risks like unauthorized access but also help businesses implement least privilege access and meet regulatory requirements.

      Log in to Reply
  11. Aisha Ings says

    November 10, 2024 at 7:42 pm

    Businesses must understand the differences between identity management and access management to effectively track both authorized and unauthorized access within their systems, ensuring that approved users can reach the resources and data granted to them. Without clear definitions in these areas, identifying users or implementing access restrictions can become challenging, potentially leading to security risks.

    Log in to Reply
    • Dawn Foreman says

      November 11, 2024 at 12:01 am

      Hey Aisha,
      I agree, especially, when it comes to managing access and authorization for a firm. I recently read that Wells Fargo had a data breach due to unauthorzied access of a former employee. As it relates to this question, the user was in the system at one point and has a digital identity with the firm, however, they should not have had access to any stsems after employment has ended.

      Log in to Reply
      • Aisha Ings says

        November 12, 2024 at 1:10 pm

        Hey Dawn,

        I completely agree with you; the user definitely should not have had access to any systems after their employment ended. This situation really highlights how critical it is to deprovision accounts promptly once someone leaves a company. It’s not just about revoking access but also about regularly auditing accounts to ensure that no unauthorized or outdated access persists. A solid deprovisioning process, paired with routine audits, is essential to protect sensitive data and prevent security breaches.

        When I hear about these breaches and the reasons behind them, I always wonder about the company’s policies and whether employees are actually following them or if there’s a lack of oversight. It really makes you think about how important it is for everyone to do their part to maintain security.

        Log in to Reply
  12. Cyrena Haynes says

    November 10, 2024 at 8:28 pm

    Understanding the difference between identity management and access management is essential for businesses because it helps in quickly identifying and addressing security risks, as it allows for more precise control and monitoring of user activities within the system. Identity management ensures that every user is accurately identified, which helps prevent unauthorized access by verifying that each person accessing the system is who they claim to be. Access management, meanwhile, focuses on defining and enforcing what specific resources these verified users can access, minimizing the risk of data breaches by restricting sensitive information only to those who need it. By properly managing identities and access separately, businesses can safeguard sensitive data more effectively, meet compliance requirements, and streamline their operations by giving employees access only to the resources necessary for their roles.

    Log in to Reply
    • Gbolahan Afolabi says

      November 12, 2024 at 10:37 pm

      Key point there Cyrena on being able to quickly revoke access to individual applications. I can imagine a situation where an organization does not have authorization properly configured and would have to spend additional time removing most users in the event of an emergency. Using groups to grant access would be more efficient!

      Log in to Reply
  13. Gbolahan Afolabi says

    November 10, 2024 at 11:04 pm

    One thing I found interesting from reading Chapter 53: Privacy-Enhancing Technologies was that some of the agenda items for PETs are that they must protect individuals from the producers and retailers of the technologies. It was interesting to me because we have discussed how important it was to maintain the CIA triad from threat actors and insiders, but it was equally important to protect the Confidentiality, Integrity, and Availability of information from the makers and sellers of certain security tools. It reminded me that it was important to understand the level of unchecked access vendors may have to the instances of tools within an organization and subsequently the visibility into an organization’s network. It was similar to an article I wrote about which explained the SolarWinds exploit.

    Log in to Reply
  14. Gbolahan Afolabi says

    November 10, 2024 at 11:17 pm

    It is important for businesses to not only understand the purpose of Identity management (Authentication), but it is also equally as important to understand the purpose of Access Management (Authorization) and the difference between the two. Understanding the difference between the two helps an organization better own protect their information systems from breaches in confidentiality. Smaller organizations tend to only focus on making sure only authenticated users can access a network, but they fall short when it comes to ensuring that only authorized users are able to read and manage certain information. Often, they don’t perform adequate analysis to understand who should have access to certain systems nor do they take the necessary precautions of removing specialized access and rights once a user switches roles.

    Log in to Reply
    • Nelson Ezeatuegwu says

      November 11, 2024 at 6:58 pm

      Hi GB

      your point is valid, when a company falls short on access management, it could lead to breach on integrity of data, verifying and validating identity is not enough to protect sensitive data, access management should be strictly enforced once identity is verified.

      Log in to Reply

Leave a Reply Cancel reply

You must be logged in to post a comment.

Primary Sidebar

Weekly Discussions

  • Unit 01: Understanding an Organization's Risk Environment (5)
  • Unit 02: Case Study 1 – Snowfall and a stolen laptop (1)
  • Unit 02: Data Classification Process and Models (6)
  • Unit 03: Risk Evaluation (6)
  • Unit 04: Case Study 2 – Autopsy of a Data Breach – The Target Case (4)
  • Unit 05: Creating a Security Aware Organization (6)
  • Unit 06: Physical and Environmental Security (6)
  • Unit 08: Case Study 3 – A Hospital Catches the "Millennium Bug" (2)
  • Unit 09: Business Continuity and Disaster Recovery (6)
  • Unit 10: Network Security (6)
  • Unit 11: Cryptography, Public Key Encryption and Digital Signature (6)
  • Unit 12: Identity Management and Access Control (6)
  • Unit 13: Computer Application Security (6)
  • Welcome (1)

Copyright © 2025 · Course News Pro on Genesis Framework · WordPress · Log in