For context, I am a one person security team as a ISM. Other IT departments are Network, Systems, and Customer service that are under a completely different direction. There has a small about of push-back when I speak on access management roles/responsibilities and separation of duties. What are some opinions on what is the best take on access management ownership with AD and Entra ID, and other services?

679 viewscircle icon1 Comment
Sort by:
IT Analyst8 months ago

If you are having resistance about it, I think the first step is to engage higher organization levels showing evolved risks. If you get green sign of them next steps are:
1) training teams about security and risks;
2) review organization's security policy;
  2.1) maybe create a standard about IAM's administration;
3) implement IAM policy

There is no formula about which team should do what, each organizations has its own way of working. It isn't a question of organizational chart, it's a question of resposibility. The most important thing is to ensure teams are aware of the their roles in the security implications.

Content you might like

AI-driven threats (deepfakes, automated attacks) 21%

Software supply chain risks 20%

Insider risk (both malicious & accidental) 11%

Regulatory compliance 8%

Cloud misconfigurations 10%

Shadow IT (or shadow AI) 8%

Ransomware 5%

Talent shortage in cybersecurity11%

Something else (comment to explain)5%

View Results

Network Detection and Response (NDR)24%

Endpoint Detection and Response (EDR)41%

Extended Detection and Response (xDR = NDR / EDR / CDR)69%

Intrusion Detection & Prevention Systems (TLS Decrypting) IDPS27%

Deception Technology (External Only)11%

Deception Technology (Internal Only)7%

Deception Technology (External & Internal)9%

View Results