Skip to main content

IAM is hot: How to stay cool and help your business think ahead

  • July 16, 2024
  • 38 replies
  • 97 views

Forum|alt.badge.img+3

We heard from a number of June office hours attendees that you wanted more info about the Delinea platform and our broader focus on identity. In response, our head of Customer Marketing, @leslie.wiggins wrote the following piece to set the stage for why we’re moving in a platform direction and in a few weeks, we’ll follow up with a webinar featuring our Product Manager @justin.harris. Let us know what else you want to know about this overarching shift toward Identity Access Management (IAM).

IAM is hot: How to stay cool and help your business think ahead

For years, Security Information and Event Management (SIEM) has captured and held most of the C-level and business attention when it comes to cybersecurity. However, the landscape has been changing - business environments have been transforming and shifting to cloud and hybrid environments, remote work and remote access by 3rd-party vendors have become the norm, and attackers have grown savvier and more focused – shifting to the highest-value targets. Identity – and how securing identities can help protect sensitive and regulated data – has become a major focus and a hot topic. Last year, a staggering 90% of organizations reported an identity-related breach, according to the Identity Defined Security Alliance. Unfortunately, most organizations’ identity security strategies have not kept pace with the changing landscape.

As a result, the Identity and Identity and Access Management (IAM) space has been heating up. As was recently reported in the 2024 X-Force Threat Intelligence Index, the use (or abuse) of valid accounts was the top initial access vector. The same report stated that “84% of critical infrastructure incidents [occurred where the] initial access vector could have been mitigated with best practices such as asset and patch management , credential hardening, and principle of least privilege.”

Identity is the first line of defense

It’s not surprising, then, that Gartner has reported in Top Trends in Cybersecurity for 2024, “As of 2023, IAM is the second most popular topic of discussion by SRM [Security and Risk Management] leaders who use Gartner’s client inquiry service.” Identity really has become – and should be –the first line of defense, and Identity teams need to be prepared to anticipate and respond to expanding business needs and pressures. With the rising excitement and expectations around IAM, it’s important to go back and review which Identity Security capabilities are being used, where gaps exist, and how silos may be raising risk.

Do you have silos?

Siloed security tools and tools that only protect Identities in one location create headaches for security teams, including limited visibility into and lack of control of the environment, time-consuming manual effort to address risks and issues, and inefficiencies across the broader cybersecurity team. The shift to Cloud has caused security issues to proliferate, as many organizations have not applied Identity Security (or other security) protections to cloud environments. The damage that the silo between on premises and Cloud environments is reflected in the 2023 Ponemon Cost of a Data Breach study, which reported that 82% of breaches involved data stored in the cloud – public, private, or multiple environments.

It’s important for organizations to step back and evaluate Identity programs and make sure solutions are centralized and integrated, providing visibility and control across use cases and environments.

Have you considered the world beyond vaulting?

Many security teams still equate Identity Security to vaulting. Although vaulting is an important foundational step within Identity Security programs to securely store and manage authentication credentials and sensitive information, other areas of Identity security also need to be considered when putting together a successful Identity Security program. Let’s consider two challenging areas tied to Identity Security: Remote access and privilege access management.

Many different people and applications depend on remote access today – from employees, business partners, and suppliers to IT and support teams. The challenge is that remote access also creates another attack vector – and it’s one that hackers are eager to use: PropertyCasualty 360 reported that 58% of recent ransomware incidents exploited a remote access vulnerability. It’s important to harden your environment and use modern methods to secure remote access. The VPN approach is not able to keep up anymore, as they can expose networks to threats, such as malware, spoofing attacks, and DDoS attacks, and can increase risk.

On the privilege access management side, according to research done by Dimension Research (Identity and Access Management: The Stakeholder Perspective), 72% of organizations report it takes a least a week for a typical worker to get a privileged identity provisioned with access to required systems (causing a delay in productivity), and 50% of the enterprises report it usually takes three days or longer to revoke access: That’s a long time to leave access open to sensitive business applications and systems. If privilege access management is a gap, this is another area that Identity Security teams should evaluate and create a plan to address.

Modernize & move forward
It’s time for Identity Security teams to level up and modernize. A modernized Identity Security program should proactively work to eliminate silos and gaps. It should enable security teams to focus on higher value activities and more proactively protect the business. Gartner also highlights “IAM infrastructure must change to deepen its support for security functions. Much of traditional IAM infrastructure in use today is overly complex and has significant gaps.” (Gartner: Top Trends in Cybersecurity for 2024). When the right Identity capabilities, spanning authorization and access, come together in a tightly integrated and highly scalable way, context can be built around identities and data to provide greater insights and protection. It’s at this point that identity security teams can stop focusing on the care and feeding of separate Identity tools and focus on high value and high visibility areas.

In the past, “Identity” just meant controlling access in a binary way: Allow/Deny. However, as bad actors have become increasingly savvy – using valid accounts as a top initial access vector to land and expand – it has become imperative for identity teams to consider and implement authentication and authorization as part of fundamental Identity hygiene to on-premises, cloud, and hybrid environments.

Today, many teams use vaulting to securely store and manage privileged credentials and sensitive information. This is a critically important first step on the journey to a robust identity security program. However, vaulting should be the beginning of your journey; not the end . Strong Identity Security requires including other capabilities along with vaulting, and your organization’s specific business and security priorities should determine the sequence of adoption. Some areas that are straightforward to adopt, yet carry a lot of impact, include:

  • Expanding to protect the Cloud :
    Some organizations move from traditional vaulting, where on-premises identities are discovered and credentials are vaulted, to also supporting discovery and vaulting of cloud identities and credentials. This helps reduce the attack surface and provides greater visibility and protection.
  • Beefing up security related to remote access:
    As mentioned above, remote access has become a fact of life. VPNs have been popular in the past, but their ability to secure organizations is immature. Many organizations are looking for greater simplicity, more sophisticated authorization capabilities, and vault integration.
  • Broadening into threat detection and response:
    Other organizations are motivated by their CISOs, in particular, to focus on threat detection analytics and speeding response. Leveraging continuous monitoring, being able to support privileged behavior analytics across networks, and having the ability to integrate identity threat detection results into the bigger security environment have been key motivating factors for these organizations.

A world-class identity posture doesn’t happen all at once. Think through the modernization path that will work best for your organization and move in a stepwise manner: Demonstrate phased success, gain acknowledgement and support from business leaders, and then grow into the next phases. Delinea’s cloud-native Identity Security platform empowers you to adopt the capabilities you are ready for, when you are ready for them, while benefiting from tight integration and massive reliability and scalability.

The Delinea Difference

Delinea enables effective Identity-first security, delivered via a cloud-native, elastic and scalable platform. The platform provides:

  • Visibility & control to discover all identities, vault and manage credentials across cloud and on-premises environments

  • The ability to harden the environment to provide secure access and to secure assets

  • Governance & dynamic authorization, providing seamless authorization policies and controls and AI-driven auditing

  • Threat detection analytics & response capabilities to detect and address identity threats in real time

By planning ahead and anticipating what will be needed, you can stay cool as Identity Security heats up. Delinea can help you evaluate and adopt expanded Identity security capabilities and augment vaulting initiatives to provide more comprehensive Identity Security for your organization. To learn more, join the upcoming customers-only Secret Society webinar.

38 replies

  • Cybersecurity Engineer Associate
  • July 17, 2024

This is awesome information to be sharing. Looking forward to the direction.


  • IT Security Analyst
  • July 17, 2024

Nice post. Very nice to read and follow on how this will be done in the future.


  • Systems Integration Engineer II
  • July 17, 2024

This all sounds quite reasonable.


  • IAM Specialist
  • July 17, 2024

Great post! Quite easy to read and follow, adn also has some great statisitcs and insights I have not yet thought about. 10/10


mike.kleiner
  • System Administrator
  • July 17, 2024

Thank you for the write up!


  • IT Security Manager
  • July 17, 2024

This is great. This was a good explanation.


Nice article and good supporting reports.


Thanks for the info.


chris.haislip
  • Cyber Defense Analyst
  • July 17, 2024

This was a very informative article.


Welcome to Secret Society! Thank you for the comments, and please let me (or the community) know if you have any questions!


Hi there Jason - thanks for taking the time to read the blog! I hope you can join us for the webinar (or catch the replay)!


Hi there Chris! Thanks for taking the time to read the article. I hope you can join us for the webinar deeper dive (or catch the replay)


Thank you, Gary! Hopefully you can join us for the webinar and a deeper dive.


You are welcome, Mike! I hope you can join us for the deeper dive webinar in a few weeks.


Thank you, Owen! I’m very glad to know it was informative and thought provoking. Hopefully you can join us for the deeper dive webinar in a few weeks.


Glad to hear it, Mike! I hope you’ll be able to join us for the deeper dive webinar at the end of July.


Thanks for the feedback, Janis. I hope you’ll be able to join us for the deeper dive webinar at the end of July!


Thanks for taking the time to read the blog, and I’m glad to know it was informative. I’m looking forward to meeting you at the deeper dive webinar at the end of July!


  • Sr. PAM Security Engineer - PAM Team Lead
  • July 17, 2024

Nice write up. I wonder how many people have their hands full with vaulting to even consider expanding into cloud and remote access?


Hi there Javan! Thanks for taking the time to read the blog! I think you raise an interesting and valid question. I would humbly attempt to address it 2 ways - at a high level – and we’ll get deeper into this conversation during the webinar with the product management at the end of July. The first part of my answer is - many teams aren’t being given the choice of whether or not to deal with cloud. For many organizations, they are simply moving to the cloud for business purposes, and security teams are simply being told to figure it out. In terms of having your hands full - I think that’s a very real issue. As we’ve been building out the SaaS-based platform strategy, in particular, we’ve been focused on how to take the maintenance/care and feeding headache away for our customers. We’ve also been considering and doing more to automate, integrate, and generally remove some of those obstacles to clear the path to do doing more. Please join the webinar to learn more - we’d love to hear more from you there and have the discussion!


  • Infrastructure Supervisor
  • July 17, 2024

Great information, thank you for the detail


Thank you for taking the time to read it! I hope you can join us to learn more during the webinar later this month!


  • Systems Administrator
  • July 19, 2024

Interesting read and info.


Thanks, David. Please join our Secret Society webinar on July 30 if you’d like to learn more!


  • Infrastructure Supervisor
  • July 21, 2024

Great information, thank you for the detail