Identity and Access Management (IAM) Reference
Identity and Access Management (IAM) is a foundational cybersecurity discipline governing how digital identities are created, authenticated, authorized, and terminated across systems, applications, and infrastructure. This reference covers the structural mechanics, classification categories, regulatory obligations, and professional service landscape of IAM as it operates within the United States. The subject intersects federal compliance mandates, enterprise security architecture, and a specialized market of professional services and technology providers documented in the Digital Security Listings.
- Definition and scope
- Core mechanics or structure
- Causal relationships or drivers
- Classification boundaries
- Tradeoffs and tensions
- Common misconceptions
- Checklist or steps
- Reference table or matrix
- References
Definition and scope
IAM encompasses the policies, processes, and technologies that ensure the right individuals and systems have appropriate access to the right resources at the right times — and that such access is documented, auditable, and revocable. The National Institute of Standards and Technology (NIST) defines identity management within NIST Special Publication 800-63, Digital Identity Guidelines as a structured assurance framework operating across three components: enrollment and identity proofing, authentication, and federation.
The operational scope of IAM extends across on-premises directories, cloud platforms, third-party SaaS environments, and operational technology (OT) networks. IAM programs govern human users, service accounts, machine identities, and API credentials — a population that in large enterprise environments can exceed 10 machine identities for every human user, according to the CyberArk 2023 Identity Security Threat Landscape Report.
Federal regulatory scope ties directly into IAM. The Federal Information Security Modernization Act (FISMA) of 2014 requires federal agencies to implement access control programs aligned with NIST guidance. The Health Insurance Portability and Accountability Act (HIPAA) Security Rule, enforced by the Department of Health and Human Services (45 CFR § 164.312(a)), mandates technical safeguards for access control, unique user identification, and emergency access procedures for covered entities. The Payment Card Industry Data Security Standard (PCI DSS), maintained by the PCI Security Standards Council, sets IAM-specific requirements for cardholder data environments including requirement 7 (restricting access by business need) and requirement 8 (strong authentication).
Core mechanics or structure
IAM architecture operates through five functional layers that interact sequentially and continuously.
Identity Governance and Administration (IGA) establishes the authoritative record of who exists in the system, what roles they hold, and what access entitlements attach to those roles. IGA platforms manage joiner-mover-leaver workflows, role mining, and access certification campaigns.
Authentication is the mechanism by which a claimed identity is verified. NIST SP 800-63B categorizes authenticators into three assurance levels (AAL1, AAL2, AAL3), with AAL3 requiring hardware-based phishing-resistant authenticators such as FIDO2-compliant security keys. Multi-factor authentication (MFA) combining at least two distinct factors — something known, something possessed, something inherent — is the baseline control specified across FISMA, HIPAA, and the NIST Cybersecurity Framework.
Authorization determines what an authenticated identity is permitted to do. The dominant models include Role-Based Access Control (RBAC), Attribute-Based Access Control (ABAC), and Policy-Based Access Control (PBAC). NIST SP 800-162, Guide to Attribute Based Access Control, provides the reference architecture for ABAC implementations in federal contexts.
Privileged Access Management (PAM) is the specialized subset governing accounts with elevated system rights — domain administrators, root accounts, service accounts with write permissions. PAM systems implement just-in-time provisioning, session recording, credential vaulting, and least-privilege enforcement.
Federation and Single Sign-On (SSO) extend authenticated sessions across trust boundaries using protocols including SAML 2.0, OpenID Connect (OIDC), and OAuth 2.0. The Internet Engineering Task Force (IETF) maintains the specifications for OAuth (RFC 6749) and OIDC builds atop the OAuth framework.
Causal relationships or drivers
IAM program maturity is directly correlated with breach frequency and severity. The IBM Cost of a Data Breach Report 2023 identified stolen or compromised credentials as the most common initial attack vector, responsible for 15% of breaches analyzed, with an average breach cost of $4.62 million for credential-based intrusions — above the global average of $4.45 million.
Three structural factors drive IAM investment and regulatory pressure.
Identity sprawl results from cloud adoption, shadow IT, and merger activity accumulating disconnected identity stores across Active Directory, cloud directories, and application-local credential databases. Unmanaged orphaned accounts — those belonging to departed employees or decommissioned services — represent persistent unauthorized access risk.
Regulatory escalation has converted IAM from an operational preference to a compliance obligation. The Cybersecurity and Infrastructure Security Agency (CISA) Zero Trust Maturity Model, published in 2023, designates Identity as one of five core pillars, establishing a federal baseline expectation that identity verification occurs continuously rather than at session initiation only. Executive Order 14028 (May 2021), Improving the Nation's Cybersecurity, required federal agencies to implement MFA and encryption within 180 days of issuance.
Workforce and supply chain complexity extends the identity perimeter beyond employees to contractors, vendors, and automated systems. Third-party access accounts for a disproportionate share of privileged access incidents, as documented in the Verizon Data Breach Investigations Report series.
Classification boundaries
IAM encompasses distinct subdisciplines that are frequently conflated but have separate governance structures, tooling categories, and compliance relevance.
| Subdiscipline | Primary Subject | Core Control | Key Standard |
|---|---|---|---|
| Identity Governance and Administration (IGA) | Human and service identities | Provisioning, access certification | NIST SP 800-53 AC family |
| Privileged Access Management (PAM) | Elevated-privilege accounts | Credential vaulting, session control | NIST SP 800-53 AC-2(4), AC-6 |
| Customer Identity and Access Management (CIAM) | External consumer identities | Registration, consent, self-service | NIST SP 800-63, CCPA, GDPR |
| Workforce IAM | Employee identities | SSO, MFA, lifecycle management | FISMA, HIPAA, PCI DSS |
| Machine Identity Management | APIs, bots, certificates | PKI, certificate lifecycle | NIST SP 800-57 |
IAM is structurally distinct from data loss prevention (DLP) and endpoint detection and response (EDR), though all three domains interact at the enforcement layer. IAM controls who can access a resource; DLP governs what data can leave; EDR monitors behavior after access is granted. Treating these as interchangeable leads to control gaps — particularly in insider threat scenarios where authenticated access is legitimate but behavioral anomalies are present.
Tradeoffs and tensions
Least privilege versus operational friction. Strict least-privilege enforcement reduces the blast radius of compromised credentials but imposes access request overhead on end users and administrators. Over-provisioning is the typical practical outcome when friction reduction is prioritized without compensating controls such as access reviews.
Centralization versus resilience. SSO and federated identity reduce credential sprawl and simplify enforcement, but a failure or compromise of the central identity provider disables all dependent systems simultaneously. The 2020 SolarWinds supply chain attack demonstrated how compromised identity federation tokens could enable lateral movement across federated environments without triggering conventional perimeter alerts.
User experience versus assurance level. NIST SP 800-63B's AAL3 requirement for phishing-resistant hardware authenticators provides the highest assurance but carries deployment costs and user adoption barriers. Organizations frequently select AAL2 solutions — such as TOTP-based authenticators — accepting residual phishing risk as a business decision.
Cloud identity versus on-premises directory. Hybrid environments operating both Azure Active Directory (Microsoft Entra ID) and on-premises Active Directory require synchronization architectures that introduce new attack surfaces — notably pass-the-hash and Golden Ticket attacks against Kerberos trust relationships. This tension is covered in depth within the Digital Security Authority's purpose and scope reference.
Common misconceptions
MFA alone constitutes an IAM program. MFA is a single authentication control, not an IAM program. An IAM program also requires identity lifecycle governance, access certification, privilege management, and audit logging. MFA without provisioning controls still leaves orphaned accounts active.
IAM is only relevant to large enterprises. The NIST Cybersecurity Framework applies to organizations of all sizes, and breach statistics from the Verizon DBIR consistently show small organizations (under 1,000 employees) as targets of credential-based attacks. The controls differ in complexity and cost, not in conceptual necessity.
Service accounts and machine identities are covered by workforce IAM. Machine identities — API keys, certificates, OAuth tokens — require separate lifecycle management processes. Machine credentials rarely cycle through the joiner-mover-leaver process applied to human accounts and frequently persist long after their originating project or application is decommissioned.
Zero Trust replaces IAM. Zero Trust is an architectural philosophy, not a product category. CISA's Zero Trust Maturity Model explicitly frames IAM as a prerequisite pillar for Zero Trust implementation, not a system it supersedes.
Checklist or steps
The following sequence reflects the standard IAM program implementation phases as structured in NIST SP 800-53 Rev. 5 (Access Control and Identification and Authentication control families) and the CISA Zero Trust Maturity Model.
- Identity inventory — Enumerate all identity types: human users, service accounts, privileged accounts, machine identities, and federated identities from third-party providers.
- Authentication baseline — Assess current authentication assurance levels against NIST SP 800-63B and identify gaps between current state and required AAL for each system classification.
- Role and entitlement mapping — Document existing role structures, identify role explosion (excessive proliferation of fine-grained roles), and map entitlements to job functions.
- Privileged account identification — Isolate all accounts with local administrator, domain administrator, or root privileges; place under PAM control with credential vaulting and session monitoring.
- Lifecycle process definition — Establish documented provisioning, modification, and deprovisioning workflows with defined approval chains and service level targets.
- Access certification schedule — Define periodic review cadence (quarterly for privileged accounts, annually or semi-annually for standard accounts) with named account owners responsible for certification decisions.
- Federation and SSO scope definition — Determine which applications will be integrated into centralized SSO; document excluded systems and compensating controls for those exclusions.
- Audit logging and monitoring — Configure identity event logging (authentication attempts, privilege escalations, provisioning changes) to feed into SIEM platforms aligned with NIST SP 800-92 log management guidance.
- Metrics and reporting — Establish key performance indicators: orphaned account count, access certification completion rate, mean time to deprovision, MFA adoption percentage.
Reference table or matrix
| Control Area | Applicable Standard | Governing Body | Enforcement Context |
|---|---|---|---|
| Digital identity assurance | NIST SP 800-63 (Rev. 3) | NIST | Federal agencies; referenced by FTC and state regulators |
| Access control and least privilege | NIST SP 800-53 Rev. 5 (AC family) | NIST / OMB | FISMA-covered federal systems |
| Authentication for healthcare | HIPAA Security Rule, 45 CFR § 164.312(a) | HHS / OCR | Covered entities and business associates |
| Authentication for payment systems | PCI DSS v4.0, Req. 7–8 | PCI Security Standards Council | Card-processing environments |
| Privileged access — federal | NIST SP 800-53 AC-2(4), AC-6 | NIST / CISA | Federal and FedRAMP-authorized systems |
| Zero Trust identity pillar | CISA Zero Trust Maturity Model (2023) | CISA | Federal civilian agencies; voluntary private sector |
| Consumer identity (privacy intersection) | CCPA (Cal. Civ. Code § 1798.100) | California AG / CPPA | Organizations processing California consumer data |
| Machine identity / PKI | NIST SP 800-57 (Key Management) | NIST | Cross-sector; required under FedRAMP |
| OAuth authorization framework | IETF RFC 6749 | IETF | Cross-industry, SSO/federation implementations |
The service providers and consultants operating across these control areas are indexed in the Digital Security Listings, organized by specialization and regulatory focus. For guidance on navigating the directory structure and identifying the appropriate provider category for a specific IAM need, the how-to reference for this resource provides structural orientation.
References
- NIST SP 800-63-3: Digital Identity Guidelines — National Institute of Standards and Technology
- NIST SP 800-53 Rev. 5: Security and Privacy Controls for Information Systems — National Institute of Standards and Technology
- NIST SP 800-162: Guide to Attribute Based Access Control (ABAC) — National Institute of Standards and Technology
- NIST SP 800-57: Recommendation for Key Management — National Institute of Standards and Technology
- NIST SP 800-92: Guide to Computer Security Log Management — National Institute of Standards and Technology
- CISA Zero Trust Maturity Model (2023) — Cybersecurity and Infrastructure Security Agency
- Executive Order 14028: Improving the Nation's Cybersecurity — The White House (May 2021)
- HIPAA Security Rule: 45 CFR § 164.312 — U.S. Department of Health and Human Services
- IBM Cost of a Data Breach Report 2023 — IBM Security
- IETF RFC 6749: The OAuth 2.0 Authorization Framework — Internet Engineering Task Force
- PCI DSS v4.0 — PCI Security Standards Council
- Verizon Data Breach Investigations Report — Verizon Business