What is access management?

Authors

Jim Holdsworth

Staff Writer

IBM Think

Matthew Kosinski

Staff Editor

IBM Think

What is access management?

Access management is the cybersecurity discipline that manages user access rights to digital resources. Access management tools and processes help ensure that only authorized users can gain access to the resources they need while blocking unauthorized access for both internal users and malicious outsiders.

Access management and identity management together form the two pillars of a broader cybersecurity discipline—identity and access management (IAM). IAM deals with provisioning and protecting digital identities and user permissions in an IT system.

Identity management involves creating and maintaining identities for all users in a system, including human users (employees, customers or contractors) and nonhuman users (AI agents, IoT and endpoint devices or automated workloads).

Access management involves facilitating secure access for these users to an organization’s data, on-premises resources and cloud-based apps and assets. The core functions of access management include administering user access policies, authenticating user identities and authorizing valid users to perform certain actions in a system.

With the rise of cloud computing, software-as-a-service (SaaS) solutions, remote work and generative AI, access management has become a core component of network security. Organizations must enable more kinds of users to access more kinds of resources in more locations, all while preventing data breaches and keeping out unauthorized users. 

Would your team catch the next zero-day in time?

Join security leaders who rely on the Think Newsletter for curated news on AI, cybersecurity, data and automation. Learn fast from expert tutorials and explainers—delivered directly to your inbox. See the IBM Privacy Statement.

Your subscription will be delivered in English. You will find an unsubscribe link in every newsletter. You can manage your subscriptions or unsubscribe here. Refer to our IBM Privacy Statement for more information.

https://www.ibm.com/us-en/privacy

Components of access management 

According to the National Institute of Standards and Technology (NIST), core access management functions include:

  • Policy administration
  • Authentication
  • Authorization

Policy administration

Granular access policies govern user access permissions in most access management systems. Organizations can take several different approaches to set their access policies.

One common access control framework is role-based access control (RBAC), in which users’ privileges are based on their job functions. RBAC helps streamline the process of setting user permissions and mitigates the risk of giving users higher privileges than they need.

For example, say that system administrators are setting permissions for a network firewall.

Organizations can use other access control frameworks as alternatives to, or in conjunction with, RBAC. These frameworks include:

  • Mandatory access control (MAC) enforces centrally defined policies on all users, based on clearance levels or trust scores.

  • Discretionary access control (DAC) enables the owners of resources to set their own access control rules for those resources. 

  • Attribute-based access control (ABAC) analyzes the attributes of users, objects and actions to determine whether to grant access. These attributes include a user's name, a resource’s type and the time of day.

Most organizations’ access control frameworks follow the principle of least privilege. Often associated with zero trust security strategies, the principle of least privilege states that users should have only the lowest permissions necessary to complete a task. Privileges should be revoked when the task is done to help prevent future security risks.

Authentication

Authentication is the process of verifying that a user is who they claim to be.

When a user logs in to a system or requests access to a resource, they submit credentials—called “authentication factors”—to vouch for their identity. For example, a human user might enter a password or a biometric fingerprint scan, while a nonhuman user might share a digital certificate.

Access management tools check the submitted factors against the credentials that they have on file for the user. If they match, the user is granted access.

While a password is the most basic form of authentication, it is also one of the weakest. Most access management tools today use more advanced authentication methods. These methods include:

  • Two-factor authentication (2FA) and multifactor authentication (MFA), in which users must supply at least two pieces of evidence to prove their identities.

  • Passwordless authentication, which uses credentials other than a password, such as a biometric factor or a FIDO passkey.

  • Single sign-on (SSO), which allows users to access multiple apps and services with one set of login credentials. SSO systems often use open protocols such as Security Assertion Markup Language (SAML) and OpenID Connect (OIDC) to share authentication data between services.

  • Adaptive authentication, which uses artificial intelligence (AI) and machine learning (ML) to analyze a user’s risk level based on factors such as behavior, device security posture and timing. Authentication requirements change in real time as risk levels change, with riskier logins requiring stronger authentication.

Authorization

Authorization is the process of granting verified users the appropriate levels of access to a resource.

Authentication and authorization are deeply linked, and authentication is typically a prerequisite for authorization. After the user’s identity has been proven, the access management system checks that user’s privileges based on predefined access policies recorded in a central database or policy engine. The system then authorizes the user to have those specific privileges during their session.

By restricting users’ permissions based on access policies, access management tools can help prevent both insider threats who maliciously abuse their privileges and well-meaning users who accidentally misuse their rights.

If a user’s identity validation fails, the access management system does not authorize them, blocking them from using the privileges associated with their account. This helps prevent outside attackers from hijacking and abusing legitimate users’ privileges.

Security Intelligence | 3 December, episode 11

Your weekly news podcast for cybersecurity pros

Whether you're a builder, defender, business leader or simply want to stay secure in a connected world, you'll find timely updates and timeless principles in a lively, accessible format. New episodes on Wednesdays at 6am EST.

Types of access management solutions

Access management solutions can be broadly classified in two categories: tools that control access for internal users, such as employees, and tools that control access for external users, such as customers. 

Internal access management tools

An organization’s internal users—staff, managers, administrators—often require access to multiple systems, including business apps, messaging apps, company databases, HR systems and more.

Almost all of an enterprise’s internal resources are considered to be sensitive, requiring protection from malicious hackers. But not every internal user needs as much access to every internal resource. Organizations need sophisticated access management tools that enable them to control user access permissions on a granular level.

Common internal access management tools include:

IAM platforms

IAM platforms are comprehensive solutions that integrate core identity and access management functions in a single system. Common features of IAM platforms include user directories, authentication tools, access policy administration and identity threat detection and response (ITDR) capabilities.

Privileged access management (PAM) tools

Privileged access management (PAM) is a subset of access management that governs and secures highly privileged user accounts (such as admin accounts) and privileged activities (such as working with sensitive data).

In many IT systems, highly privileged accounts are afforded special protections because they are high-value targets that malicious actors can use to cause serious damage.

PAM tools isolate privileged identities from the rest by using credential vaults and just-in-time (JIT) access protocols. JIT gives authorized users privileged access to a specific resource for a limited time upon request, rather than giving users perpetually elevated permissions.

Identity governance and administration (IGA) tools

Identity governance and administration (IGA) tools help ensure that an organization’s access policies and access controls meet security requirements and regulatory mandates.

IGA solutions offer tools for defining and implementing compliant access policies throughout each user’s lifecycle. Some IGA tools can also help automate key compliance workflows, such as user onboarding and provisioning, access reviews, new access requests and deprovisioning for offboarded users. These functions give organizations more oversight over user permissions and activity, which makes it easier to detect—and stop—privilege misuse and abuse.

Zero trust network access (ZTNA) solutions

ZTNA solutions are remote access tools that follow the zero trust principle of “never trust, always verify.”

Traditional remote access tools, such as virtual private networks (VPNs), connect remote users to the entire corporate network. In contrast, ZTNA connects users only to the specific apps and resources they have permission to access.

Moreover, in the ZTNA model, users are never implicitly trusted. Every access request for every resource must be verified and validated, regardless of the user’s identity or location. 

External access management tools

Organizations must often facilitate secure access to resources for external users. Customers might need access to their accounts on e-commerce platforms. Vendors might need access to invoicing systems. Business partners might need access to shared data. External access management tools specifically serve these external users.

Some organizations use the same tools for internal and external access management, but this strategy isn’t always feasible. The needs of internal and external users can differ. For example, external users often prioritize convenience over security, while internal users have higher privileges that require stronger protections.

Customer identity and access management (CIAM)

Customer identity and access management (CIAM) tools govern digital identities and access security for customers and other users who sit outside of an organization.

Like other access management tools, CIAM systems help authenticate users and facilitate secure access to digital services. The core difference is that CIAM tools emphasize the user experience through progressive profiling (allowing users to complete their profiles over time), social logins and other user-friendly features. 

Why access management is important

Access management tools help organizations facilitate secure access to sensitive resources for authorized users regardless of where they are located.

The result is a more secure, more efficient network. Users have the uninterrupted access that they need to do their jobs, while threat actors and unauthorized users are kept out. 

Improved security

As organizations embrace hybrid and multicloud environments, centralized on-premises IT networks become a thing of the past. Perimeter-focused security solutions and strategies cannot effectively protect networks that span devices, users apps and databases spread around the globe.

And hackers are increasingly focused on the identity attack surface, stealing credentials to break into networks. According to the IBM® X-Force® Threat Intelligence Index, 30% of cyberattacks involve the theft and abuse of valid accounts.

Access management tools shift organizational defenses away from the perimeter to focus on individual users, resources and sensitive data by securing access itself. Authentication tools help protect user accounts from hijackers, while authorization tools help ensure that users use their privileges only for legitimate reasons.

Access management tools can also help automate certain security tasks, such as conducting regular access reviews and deprovisioning users when they leave an organization or change roles. These tools help combat “privilege creep,” where users slowly and subtly end up with more permissions than they need over time. 

Better user experience

Access management tools can make it easier for users to access the resources they need without sacrificing safety. For example, a single sign-on (SSO) system allows users to authenticate once to access multiple resources. Biometric authentication measures allow users to log in with fingerprint scans and other unique credentials that are harder to crack but easier to enter than a password. 

Operational efficiency 

Access management tools can streamline the process of provisioning and deprovisioning users. For example, role-based access control frameworks can automatically assign the right privileges to users based on predefined policies. System administrators have less routine work to do, and new employees can get started right away rather than waiting for manual access approvals. 

Regulatory compliance  

Data privacy and security standards and regulations—such the Payment Card Industry Data Security Standard (PCI DSS) and the General Data Protection Regulation (GDPR)—require that organizations maintain strict access controls for certain types of sensitive information. 

The price of noncompliance can be high. For example, major infringements of the GDPR can result in fines of up to EUR 20,000,000 or 4% of the organization's worldwide revenue in the previous year.

Access management solutions can help organizations meet compliance requirements by enforcing centrally defined access privileges that help ensure that only the necessary users have access to data, and only for authorized reasons. 

Some access management tools can also keep records of user activity and access requests, creating audit trails that can help organizations prove compliance and pinpoint violations. 

Reduced costs

Access management tools can help organizations save money by improving efficiency, security and compliance.

For example, strong authentication tools can thwart many identity-based attacks, reducing downtime due to security threats. IT teams might field fewer help-desk calls when user permissions are automatically provisioned. And organizations are less likely to face fines or legal fees when their access policies are compliant. 

Related solutions
IBM Verify

Build a secure, vendor-agnostic identity framework that modernizes IAM, integrates with existing tools, and enables seamless hybrid access without added complexity.

Explore IBM Verify
Security solutions

Safeguard your hybrid-cloud and AI environments with intelligent, automated protection across data, identity, and threats.

Explore security solutions
Identity & Access Management Services

Protect and manage user access with automated identity controls and risk-based governance across hybrid-cloud environments.

    Explore IAM services
    Take the next step

    Enhance IAM with Verify for seamless hybrid access, and strengthen identity protection by uncovering hidden identity-based risks with AI.

    Discover IBM Verify  Explore IBM Verify identity protection