[Expert opinion] CIO best practices for identity and access management

Talkspirit
2023-06-01
5
min.

Temps de lecture: 5 minutes

More and more organizations are embracing a hybrid or fully remote work environment—and that means more and more employees are accessing company systems, data, and information from a variety of devices and locations, making identity and access management more important than ever.

But as CIO, how can you ensure your identity and access management (IAM) practices are safe, secure, and effective?

We asked Liz Tluchowski, CIO and CISO of insurance broker World Insurance, where she oversees IT, information and security, for her insights into best practices for identity and access management. Here’s what she had to say:

Why is proper identity and access management so important?

First things first. Let’s quickly touch on the role of identity and access management (IAM) in an organization—and why proper IAM practices are so important.

“[Access and] identity management’s purpose is to make sure that the right people and job roles can access the tools needed to do their job,” says Tluchowski. 

The key phrase in that sentence? The right people and job roles. Proper access and identity management practices help to protect your company’s network—and give you control over who has access to what. “Identity and access management provides a valuable layer of security against unknown security vulnerabilities with added control over what is being accessed and by whom,” says Tluchowski.

And not having a set of IAM best practices in your organization? It puts your company at risk. “As IT has the role of the gatekeeper, not having the controls to be able to identify who is accessing our systems and what they are accessing is a recipe for bad things to come from a security perspective,” says Tluchowski.

So, what are some of those risks? “Poor control can compromise an organization’s security at several levels,” says Tluchowski. For example, if an unauthorized user is able to access your network, they could get access to customer data—which could lead to a host of problems, like regulatory issues (if you store sensitive customer information) or financial losses (for example, if customer credit card information was stolen).

That’s what happened in the 2019 Capital One security breach, when an unauthorized user gained access to Capital One’s server and and over 140,000 US social security numbers, 1 million Canadian Social Insurance numbers, and 80,000 bank account numbers as well as identifying information, putting customers (and the company’s reputation) at major risk.

Clearly, having a set of best practices for identity and access management is a must to keep your company’s data and sensitive information secure—and, as CIO, it’s your job to develop and implement those practices. 

But what, exactly, are those practices? Let’s take a look at a few best practices for identity and access management you should definitely consider incorporating into your organization:

Create clear policies and procedures around identity and access management

You can’t improve your company’s identity and access management without a plan. And so, if you want to improve your organization’s approach to IAM? You need to clearly outline that plan for yourself and your team—and that means developing clear policies and procedures

As you’re developing your IAM best practices, make sure to clearly outline relevant policies and procedures for your employees. For example, if you’re going to be implementing two-factor authentication for your remote employees, you’ll want to create a procedural document that walks employees through how to get set up with two-factor authentication, how to use it to login remotely, and what to do if they have issues with the process (for example, if they don’t have access to their mobile device to retrieve their authorization code). 

In terms of what policies and procedures you should create, it will depend on your organization’s structure and goals. But whatever policies and procedures you decide to create, make sure they are written in a way that “will provide structure and give you results that you can measure,” says Tluchowski. 

For example, if you’re developing a procedure for your IT team to monitor remote access, you might lay out the steps you want them to take to increase security (like performing regular security audits to identify potential threats)—and then set clear metrics for how you’re going to measure how successfully the procedure is being implemented. For example, you may want to clearly outline the number of audits you expect each employee to complete each month—and how quickly you expect security threats to be managed. 

Also read: [Expert Opinion] 4 Security Commandments for the CIO in the Era of Hybrid Work

Consider taking a zero trust approach

When it comes to identity and access management, it’s better to be overly cautious than not cautious enough. So, if you want to ensure that only authorized persons are able to access your network, “consider a zero trust concept to make sure that network resources are limited only to specific users,” says Tluchowski. 

With the zero trust concept, the assumption is that any device attempting to access your network is not secure—which means that every device must go through an authorization and authentication process before being granted access to the network. Essentially, going with a zero trust approach to identity and access management adds an extra layer of security—which can help you better and more quickly identify any threats or suspicious activity.

Continually monitor, manage, and remove accounts

Identity and access management practices are, by definition, continually changing. For example, when an employee leaves your company, you no longer want them to have access to sensitive company information. Or, if you move an employee from one department to another, you may need to change what information they have access to (and how they access it). “[Identity and access management is] a constant evolution that will…[progress] as the company’s needs change and users shift…to other job roles [or leave the company],” says Tluchowski.

That’s why, if you want your identity and access management processes to be as secure as possible, you need to continually monitor, manage, and remove accounts

Review user access and make sure that it aligns with the needs to perform their job responsibilities,” says Tluchowski. “Always remove accounts that are no longer needed and manage any generic accounts.”

Make removing access part of your employee offboarding procedures—and have your IT team regularly review identity and access management for existing employees to ensure their access aligns with their job responsibilities (and that they don’t have more or less access to information than they need).

Leverage automation

As CIO, it’s your job to do everything you can to ensure secure identity and access management. But you certainly don’t need to do everything manually! There are a host of tools out there that can make your IAM processes easier, more streamlined, and—most importantly—more secure. 

Do your research to find the IAM tools that make sense for your needs and goals—and then be willing to make the investment to implement those tools across your organization. 

And try not to get sticker shock. When you leverage the right tools, they’re more than worth the initial investment. “[Using automation tools for] managing identity authentication and authorization to reduce the risk to the business is worth the up-front costs—and will quickly demonstrate the ROI from the efficiencies and layers of security provided by using these tools,” says Tluchowski.

Also read: CIOs: what IT investments should you prioritize in 2021?

Implement these best practices for more effective and secure identity and access management

Safe, secure, and effective identity and access management is critical—particularly in today’s world of remote and hybrid work. And now that you understand the must-know best practices, you’re armed with the information you need to better control how employees access your company’s network, data, and sensitive information—and make your organization more secure in the process.

*
*   *

Are you looking for more best practices to ensure the security of your organization’s data in the era of hybrid work? Read our white paper to find concrete tips from several CIOs:

Access White Paper

In our white paper “CIOs: Navigating the New Challenges of Hybrid Work”, you’ll discover: the 3 major challenges for CIOs in the era of hybrid work, concrete advice on how to accelerate your digital transformation, secure your workstations and improve the employee experience, as well as testimonials from 10 CIOs working in companies, administrations and associations.

Download



Author: Deanna deBara

Inscrivez-vous à notre newsletter
En vous inscrivant vous acceptez notre politique de confidentialité et consentez à recevoir des nouvelles de notre entreprise.
Envoyer
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
ALLER PLUS LOIN

Vous avez les ressources pour passer à l’action

2025-01-24
7
min.

Top 10 Technology Trends in 2025, According to Gartner

2025-01-02
7
min.

Top HR Trends in 2025, According to Gartner

2024-12-26
6
min.

5 Strategies That Can Help Improve Employee Autonomy at Work

2024-12-19
6
min.

HR: Watch Out for These Employee Burnout Signs

2024-12-12
min.

[Expert Opinion] Elmy’s Journey to Becoming a Mission-Driven Company

2024-12-09
5
min.

Regenerative Business: the Trend Taking Companies by Storm

2024-12-05
6
min.

How can companies combine digital sobriety with well-being at work?

2024-11-29
7
min.

Agile Methodology: What Are the Pros and Cons for Businesses?

2024-11-19
8
min.

Creating OKRs Aligned with Your ESG Goals: a Step-by-Step Guide

2024-11-13
8
min.

Implementing Accessibility in the Workplace: Key Strategies and Best Practices

2024-11-13
6
min.

8 Steps to Create a Collective Intelligence Framework that Speeds Up Decision-making

2024-11-12
7
min.

Comment mesurer l’impact social et environnemental d’une entreprise ?

2024-11-07
7
min.

Management agile : 7 clés pour embarquer vos équipes

2024-11-07
5
min.

Meta Meltdown: What Can We Learn from the Workplace Closure?

2024-11-06
8
min.

How Can You Promote Sustainable AI in the Workplace?

2024-11-04
5
min.

Collaborative Platform: Definition and Challenges

2024-11-03
5
min.

20 collaborative tools to improve employee productivity

2024-10-29
8
min.

Parole d’expert : Comment améliorer l’équité, la diversité et l’inclusion en entreprise ?

2024-10-28
6
min.

7 Best Practices for Leveraging Emotional Intelligence as a Leadership Tool

2024-10-23
7
min.

RH : Les symptômes de burnout auxquels il faut être attentif

2024-10-17
7
min.

Améliorer l’autonomie au travail, c’est possible avec ces 5 leviers

2024-10-10
5
min.

Do Purpose-Driven Companies Outperform Traditional Ones?

2024-10-09
10
min.

Best Leadership Practices for Boosting Employee Engagement

2024-10-08
7
min.

[Parole d’expert] Comment devenir une entreprise à mission ?

2024-10-08
6
min.

Turn your employees into ambassadors for your enterprise social network!

2024-10-01
8
min.

How Does AI Impact Employees Within an Organization?

2024-10-01
6
min.

How can AI shape the future of self-management: insights from the academic literature

2024-10-01
7
min.

10 exemples d’utilisation du biomimétisme en entreprise

Article
2024-10-01
6
min.

Gartner’s 10 technology trends for 2024

2024-09-30
9
min.

What Participative Decision-Making Can Bring to Your Organization

2024-09-30
8
min.

How the Next Generation Company Is Redefining the Future of Work

2024-09-30
6
min.

How Do You Tactfully Handle a Micromanaging Boss ?

2024-09-30
8
min.

How Do You Give Constructive Feedback to Your Peers in a Self-Managing Organization?

2024-09-30
8
min.

How Consent-Based Decision-Making Works

2024-09-30
8
min.

From Corporate Hierarchy to Agility: How to Create Engaged and High-Performing Teams?

2024-09-30
7
min.

Driving Culture Change with Holaspirit: Insights from Welser Profile

2024-09-26
6
min.

5 Interesting Ways AI Can Transform Knowledge Management Processes

2024-09-17
7
min.

Critères ESG : pourquoi et comment les intégrer dans votre stratégie RSE ?

2024-09-10
10
min.

How Can You Improve Organizational Agility in the Workplace?

2024-09-10
5
min.

L’entreprise à impact : LA réponse aux défis du développement durable

2024-09-09
9
min.

How to Improve Cross-functional Team Collaboration

2024-09-05
6
min.

[Expert Opinion] Amicio’s Best Practices for Agile and Effective collaboration

2024-09-03
6
min.

Les entreprises à mission sont-elles plus performantes que les entreprises traditionnelles ?

2024-08-29
7
min.

Raison d’être, vision, mission : de quoi parle-t-on ?

2024-08-29
7
min.

Performance Management: 4 Keys to Building Effective Teams

2024-08-22
6
min.

Managers: 8 Hacks for Improving Teamwork Efficiency

2024-08-20
6
min.

Entreprise régénérative : de quoi parle-t-on ?

2024-08-13
6
min.

7 techniques éprouvées pour responsabiliser ses collaborateurs

2024-08-12
6
min.

Sustainable performance: the art of combining productivity and social responsibility

2024-08-09
6
min.

How Do I Set Up My Internal Communication on Corporate Social Responsibility (CSR)?

2024-08-08
6
min.

5 Examples That Show How Different Organizations Can Leverage the Same Collaborative Platform

2024-08-06
6
min.

[Webinaire] Opportunités et risques de l’IA : ce que les entreprises nouvelle génération doivent absolument savoir !

2024-08-04
5
min.

How to implement an enterprise social network in your company

2024-08-02
7
min.

How will artificial intelligence transform the way we work?

2024-07-30
7
min.

Nos 15 podcasts de management préférés

2024-07-25
8
min.

Key Employee Engagement Data from Gallup's 2024 Study

2024-07-25
10
min.

13 Icebreaker Ideas for More Dynamic Team Meetings

2024-07-23
7
min.

6 bonnes pratiques pour améliorer la cohésion d’équipe

2024-07-22
5
min.

Why Scale Ups Opt for a Self-Management Tool?

2024-07-22
5
min.

Why Is Accountability Important in the Workplace?

2024-07-22
8
min.

The Pros & Cons of Going Teal

2024-07-22
3
min.

The Power of Spotify Squads

2024-07-22
8
min.

Setting Roles Into Your Organization

2024-07-22
6
min.

How to Implement Effective Self-Management in the Workplace

2024-07-22
7
min.

Empowering the right people in the right roles

2024-07-22
7
min.

Our Step-by-Step Guide to Effective Governance Meetings

2024-07-22
5
min.

How to Measure the Success of Holacracy in Your Organization

2024-07-22
5
min.

Integrative Decision-Making VS Consensus

2024-07-22
9
min.

How the Liberated Company Unleashes Your Employees’ Potential

2024-07-22
8
min.

How To Instil Self-Advocacy in Employees and Build Stronger Teams in the Process

2024-07-22
10
min.

💥 How can Scaleups Grow Faster and Successfully by Integrating Strategy into their Organization Structure?💥

2024-07-22
10
min.

Everything you Need to Know About Organizational Health

2024-07-22
4
min.

Finding Your Organization’s Purpose

2024-07-22
15
min.

50 Effective Employee Engagement Strategies

2024-07-22
9
min.

Effective Team Meeting: Strategies, Agendas, and Checklist Included

2024-07-19
8
min.

Why Should you Consider Implementing a Shared Leadership Model?

2024-07-19
10
min.

What is Shared Governance?

2024-07-19
7
min.

5 Tactics to Adapt Your Business to a VUCA World

2024-07-19
5
min.

How Does Employee Engagement Affect Business Results

2024-07-19
6
min.

Agile Trends 2024: What is the Next Wave of Agile Transformation?

2024-07-18
6
min.

What Makes Self-Managed Teams Unique?

2024-07-18
5
min.

The Influence of Company Culture On Employee Engagement

2024-07-18
7
min.

How Does a Flat Organization Actually Work?

2024-07-18
5
min.

Essential Meeting Room Equipment for Modernizing Your Workspace

2024-07-16
9
min.

What Does a Transparent Company Actually Look Like?

2024-07-16
13
min.

What Is Self-Management?

2024-07-16
17
min.

The Best Self-Management Tools for Your Organization

2024-07-16
7
min.

What is Sociocracy? Introducing a Toolkit for Agile Organizations

2024-07-16
8
min.

Teal Organization: Everything You Need to Know

2024-07-16
6
min.

A Guide to Tactical Meetings (Agenda Template Included)

2024-07-16
4
min.

Org Chart Templates and Visual Organization Representation

2024-07-16
7
min.

How to Clearly Define Roles and Responsibilities Within Your Team?

2024-07-16
9
min.

How QoQa Managed to Successfully Implement Holacracy Using Holaspirit

2024-07-16
8
min.

How Great Place To Work Implemented Self-Management Using Holaspirit

2024-07-16
26
min.

Holacracy: Core Concepts, Benefits and Limitations

2024-07-16
8
min.

Example of Company OKRs, How Did They Do It?

2024-07-16
8
min.

8 Best Kept Secrets of High-Performing Agile Teams

2024-07-16
12
min.

5 organizational governance models to make your teams more agile

2024-07-16
6
min.

Les meilleurs outils SaaS pour votre entreprise

2024-07-09
6
min.

Gérer la communication interne d’une association avec Talkspirit : le défi de l’ARSL!