1(630)802-8605 Ravi.das@bn-inc.net

In today’s blog, we continue with our theme on the Identity Access Manager, onto what the hot trends will be for this year. Here are the next two:

The Hot Trends for IAM by 2020

  • Forget Least Privilege:

For the longest time, “Least Privilege” has been one of the major cornerstones of the security policies for both businesses and corporations.  Essentially, this grants employees only the access they absolutely require in order to fulfill their job responsibilities. In fact, this concept has roots even in government and military security.  But, with the rapid growth of mobile based technologies and Cloud Computing, it is hard to make this rigid policy to become flexible enough to keep up with the times.  Therefore, any IAM System will have to be recalibrated in order to allow all employees to have unrestricted access to non-sensitive and non-critical applications, network resources, as well as corporate information and data.  Thus, this will allow the IT staff to focus their critical resources on protecting what matters most:  the intellectual property.

  • Permissions will be based on attributes:

IAM Systems in businesses and corporations have relied heavily upon the concept known as “Role based Access Control” (also known as “RBAC”) in order to grant permissions and access to resources.  But, with the conglomeration of forces which is precipitating today, such as Social Media, Bring Your Own Device, Big Data, etc., there will be much more interaction between employees, devices, services, and the external environment.  Thus, it will be very difficult to use the principles of RBAC in describing these types of relationships, which is often thought of as a one-dimensional approach.  Rather, they will be described through a set of attributes, or contextual information. This offers a multi-dimensional approach known as “Attribute based Access Control”, or “ABAC”.

I have been a tech writer in the IT Security realm for the last 8 years.  Whoever thought that Least Privilege would be done with once and for all?  This is probably one of most important and cardinals for any Security and DR Policy.  Personally, I think this will lead to more Cyberattacks!!!!