Growth in the number of entitlements across on-premises, cloud infrastructure and SaaS applications creates role management challenges for IAM administrators. Security and risk management technical professionals should use modern tools and iterative processes to develop and optimize an IGA role model.
- Traditional approaches to role mining are not scalable. They often result in role proliferation and lead to an outdated identity governance and administration (IGA) role model over time.
- IGA solutions, which are implemented by many organizations, offer limited capabilities to continuously detect and update the role model based on changes to the applications and identities.
- Removing unused and anomalous access to entitlements is crucial for optimizing the role model, but an agile approach — leveraging advanced analytics — to clean upexcess access is often overlooked.