Identity Management Fundamentals

The concept of identity management is simple. It’s basic and it’s fundamental to information security. This begs the question, why are so many organizations terrible at it?  
 
By Evan Francen, CEO of FRSecure
 
Revisiting the basics
Let’s level set. Experts can use the reminder, and novices need to learn. Understanding the basics of identity management is critical before diving into the deep end.
 
First, identity management (IM) is different than identity and access management (IAM), even though the majority uses these terms interchangeably. The confusion leads to poor practices and terrible results. I’ll explain.
 
Identity
In a system, there are subjects and objects. Subjects are active entities, objects are passive. Subjects operate (read, write, delete, etc.) on objects or other subjects. Subjects require an identity, a way to identify them in the system. Subjects are often associated with people, but not always. There are other active entities in the system that also require an identity, things like services and applications.
 
Sometimes it helps to put identity into context, which is where access management enters the fray.
 
Identity, Authentication, Authorization, and Accountability
If an identity were used by itself, it would result in chaos. Any subject could use any identity, and all subjects could use all identities. Identities could either do nothing in a system or do all things in a system. Compounding our problems is the fact that you wouldn’t know what was happening or even if anything was happening at all.
An identity is an element that exists by itself, but it needs other functions in order to work within a system. Identity is an identifier of a subject (user, application, service, etc.) in a system. The identifier is most often stored by the system as an account; user account, system account, etc. It’s safe to use identity and account synonymously.
 
Functions that make an identity usable:
 
Authentication – Verification (or proof) that a subject is permitted to use an identity. This controls which subjects use which identities. Proof can come in several forms, or factors. The most traditional forms of authentication are:
  Something you know – a password, PIN code, passphrase, etc.
•  Something you have – a cell phone (where a text can be sent), a computer, a token, an access card, etc.
•  Something you are – most often called a biometric; fingerprint, face (facial recognition), hand shape (hand geometry), etc. 
Authorization – The things, permissions and privileges, that a subject is granted within the system while using an identity.
Accountability – Evidence of what’s happening and what happened in a system. Logging is a common form of accountability.
 
The basics are beautiful. Without authentication, any subject could use any identity and all subjects could use all identities. Without authorization, an identity could either do nothing in a system or do everything in a system. Without accountability, we would have no idea what’s happening.
 
Difference between IM and IAM
At a functional level; IM relates only to the identity; however, managing an identity must also include authentication. Authentication controls which subjects can access which identities. Identity management then is identity and authentication from our previous definitions.
 
At a functional level; IAM includes access, meaning what an identity is permitted to do; authorization. Identity and access management then includes identity, authentication, and authorization. Both IM and IAM benefit from accountability, so this function is added to both. This results in:
 
• IM = Identity + Authentication + Accountability
• IAM = Identity + Authentication + Authorization + Accountability
 
IA and IAM are in fact two functions that are integrated, not one single synonymous function. 
 
 
 
Start with identity management
If you don’t get IM right, you’ll never get IAM right. Most organizations fail at IM, and don’t have a prayer in getting IAM correct. Over the past year, we’ve compiled the results of more than one hundred Active Directory user account audits. The results aren’t good.
 
On average, 42.4% of all accounts (user and service) are enabled, 54.19% of the accounts are disabled, and 3.41% of the accounts are expired. The table referenced here only accounts for enabled accounts. So, it’s safe to say that on average, 13.02% of enabled accounts were found to have not logged in within the past year and 17.69% had passwords that exceed the age of one year.
 
Most troubling; however, may be the fact that 14.77% of all enabled accounts showed no evidence of having ever logged in.  If these numbers don’t trouble you, maybe they haven’t sunk in yet.
 
Why are things this broken?
Things that are neglected fall apart. Like the decay of a neglected farm home, so becomes a user account database (e.g. Active Directory). There are three primary reasons for the decay:
 
1. Poor definition and formalization of identity lifecycle processes. There are four high-level processes that must be defined and formalized; Creation, Change, Deactivation (disable/delete), and Audit. There are several supporting processes under these headings. Processes must be defined and documented.
2. Poor understanding of the fundamentals and feeling overwhelmed. We know that IM and IAM are integrated, but different. Start with IM, and an identity audit. Validate every identity, and shore up authentication. A tedious exercise, but not an overwhelming one.
3. The work is tedious and uncomfortable. Tedious work isn’t appealing. People want easy buttons and blinky lights. The work can be uncomfortable because it will require coordination with the business. Coordination will be the only way you can effectively validate the identities.
 
Identity management isn’t complicated, but it does take a commitment. You can do it, and you’ll be glad you did! Next up, the “A” in IAM.
 
Evan Francen is CEO & Co-Founder of FRSecure 
 
You Might Also Read:
 
No Easy Button Solution To Cybersecurity’s Skills Shortage:
 
 
 
 
 
« The EU’s Copyright Directive Risks Creating Two Internets
The UK Needs Data Driven Policing »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Infosecurity Europe, 3-5 June 2025, ExCel London

Infosecurity Europe, 3-5 June 2025, ExCel London

This year, Infosecurity Europe marks 30 years of bringing the global cybersecurity community together to further our joint mission of Building a Safer Cyber World.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 7,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Riverbed Technology

Riverbed Technology

The Riverbed Network and Application Performance Platform enables organizations to visualize, optimize, accelerate and remediate the performance of any network for any application.

Vanguard Integrity Professionals

Vanguard Integrity Professionals

Vanguard Integrity Professionals is an independent provider of enterprise security software solutions that address complex security and regulatory compliance challenges.

Stott & May

Stott & May

Stott & May is a specialist cyber security recruitment agency.

ATIA

ATIA

ATIA provides consulting services in the design and implementation of IT system, Information Security, ISO certification, and professional IT training and education.

Featurespace

Featurespace

Featurespace is a world-leader in Adaptive Behavioural Analytics and creator of the ARIC platform for fraud and risk management.

Dracoon

Dracoon

DRACOON is market leader in the German-speaking region for secure enterprise file sharing.

Global Cyber Security Capacity Centre (GCSCC) - Oxford University

Global Cyber Security Capacity Centre (GCSCC) - Oxford University

GCSCC's work is focused on developing a framework for understanding what works, what doesn’t work and why – across all areas of cybersecurity capacity.

Cohesity

Cohesity

Cohesity radically simplifies the way businesses back up, manage, protect, and extract value from their data—in the data center, at the edge, and in the cloud.

SecZetta

SecZetta

SecZetta provides third-party identity risk solutions that are easy to use, and purpose built to help organizations execute risk-based identity access and lifecycle strategies.

Cutting Edge Technologies (CE Tech)

Cutting Edge Technologies (CE Tech)

CE Tech is a Next Generation Technology Partner providing advanced technology infrastructure solutions through partnerships with leading technology providers.

UK Cyber Security Council (UKCSC)

UK Cyber Security Council (UKCSC)

The role of The UK Cyber Security Council is to champion the cybersecurity profession across the UK, provide representation for the industry, accelerate awareness and promote excellence.

Moss Adams

Moss Adams

Moss Adams is a fully integrated professional services firm dedicated to assisting clients with growing, managing, and protecting prosperity.

Luta Security

Luta Security

Luta Security implements a holistic approach to advance the security maturity of governments and organizations around the world.

Evo Security

Evo Security

Evo Security is an Identity and Access Management company focused exclusively on serving MSPs, MSSPs and their SMB and Mid-Market customers.

Astreya

Astreya

Astreya is the leading IT solutions provider for some of the world's most recognizable and innovative organizations.

CyXcel

CyXcel

CyXcel is a cyber security consulting business grounded in the law which natively fuses crises, legal, technical, and consulting expertise digital networks, information and operational technology.