Contact us

Cybermoi/s 2024: our IAM best practices

On the occasion of Cybermoi/s 2024, European Cyber Security Month, I'd like to share my belief in the importance of identity and access management (IAM) solutions to secure our digital environment.

My commitment as CISO


On the occasion of Cybermoi/s 2024, European Cybersecurity Month, I would like to share my belief in the importance of identity and access management (IAM) solutions for securing our digital environment.


As CISO at Memority, I am convinced that adopting these solutions is essential to protecting the sensitive information of our company and our customers. Here are four IAM best practices that I encourage all companies to adopt to strengthen their security.



IGA: a fundamental pillar of IAM

Identity Governance and Administration (IGA) is the central component of a successful IAM strategy. It is essential for establishing rigorous access control within an organization. By implementing clear rules and role assignment processes, I ensure that every user, employee, partner, or connected object has the appropriate access rights. At Memority, IT, our platform, and HR systems are an integral part of this management, providing a comprehensive overview of access. With this increased visibility, companies can justify who accesses which resources and why.


It also reduces internal risks by limiting access rights according to the principle of least privilege. This principle ensures that each employee or partner has only the rights necessary to perform their tasks, thereby reducing the impact of accidental or malicious compromise. It is also essential to remember the importance of audits and access reviews. It is now possible to automate these operations, which were previously very costly in terms of resources.

Furthermore, IGA plays a crucial role in regulatory compliance. It not only helps meet the requirements of privacy laws, with GDPR at the forefront, but also other regulations such as NIS2 or DORA, as well as numerous standards like ISO27001, ISO27701, and SecNumCloud that we implement at Memority, by ensuring full traceability of user access and actions.


Why do I recommend IGA?


  • Centralized and efficient identity management
  • Guaranteed compliance through regular reviews
  • Enhanced access control

Single Sign-On (SSO) and Identity Federation: simplifying access


In an environment where a multiplicity of applications and systems is the norm, Single Sign-On (SSO) and identity federation are essential solutions to simplify access while increasing security.


SSO allows users to authenticate once to access a set of applications. This significantly reduces risks related to password management. Fewer passwords to remember means less risk of insecure behavior (use of simple or reused passwords, inattentiveness during prompts, etc.). In addition to simplifying the user experience, this approach reduces the number of password reset requests, thus freeing IT teams from repetitive tasks.


The implementation of Single Sign-On (SSO) in all companies is highly recommended. This approach simplifies users' lives by allowing them to access all their applications with a single credential. This reduces the stress associated with managing multiple passwords and decreases the associated security risks.


The advantages of this practice:


  • Secure and seamless access for all users
  • Fewer password-related issues
  • Simplified management for external identities

Multi-Factor Authentication (MFA) and Adaptive Authentication: strengthening security


I cannot emphasize enough the importance of Multi-Factor Authentication (MFA) for securing critical access points. This method adds a layer of security by requiring multiple forms of identification, a crucial approach in today's cyber-threat landscape.


Implementing Multi-Factor Authentication (MFA) is one of the most effective measures for protecting user accounts. By combining several authentication factors (for example, a password and validation via a mobile device), MFA makes hacking attempts significantly more complex.


By integrating Risk-Based Authentication (RBA) solutions, I ensure that the risk of each access attempt is evaluated in real-time and that the appropriate authentication method is applied.


The integration of MFA and adaptive authentication thus reinforces system protection while ensuring flexibility to adapt to specific situations. On the Memority platform, these solutions apply to employees as well as partners, customers, and even connected objects.


Numerous benefits:


  • Reduced risk of unauthorized access
  • Dynamic security based on access context
  • Increased protection for users, connected objects, and corporate resources

Identity as a Service (IDaaS): the key to efficiency


Adopting an Identity as a Service (IDaaS) approach is a strategic choice I recommend. This approach centralizes IAM management in the cloud, facilitating secure access to resources regardless of their location. This proves particularly useful in a society where remote work and operational flexibility have become commonplace.


The main advantage of the IDaaS model is its scalability. It easily adapts to company growth or changes without requiring additional infrastructure. It also allows you to benefit from the advantages described above "à la carte" without having to plan new deployments. Companies can thus focus on their core business while benefiting from modular, state-of-the-art identity management. Furthermore, the IDaaS model allows for easy integration of SSO, MFA, and federation solutions, offering unified access management even on a very large scale.


Finally, with Memority IDaaS, we benefit from a unified platform to manage all users, whether they are employees, partners, or customers: thanks to a self-service portal, users can autonomously manage their access and track their authentications, thereby reducing the workload for IT teams.


The benefits I observe:


  • Simplified, scalable, and agile identity management
  • A reduction in costs associated with access management
  • An improved user experience thanks to self-service options

In conclusion


Often overlooked or equated with complex management, IAM is undeniably the cornerstone of corporate security in the digital age. By implementing solid IDaaS solutions, including IGA, SSO, identity federation, and multi-factor and adaptive authentication, companies strengthen their security while simplifying identity and access management. These best practices apply to all profiles—employees, partners, customers, citizens, or connected objects. They guarantee an optimized user experience while protecting information systems against current threats.


On the occasion of Cybermoi/s 2024 (Cybersecurity Month), it is imperative to remember that identity management is a major issue impacting all levels of the organization. Whether you are a CEO, CISO, CIO, member of the IT team, or any other user, these IAM practices contribute to reinforced cybersecurity and better risk management.

Published by

Aymeric Berrendonner

Cybersecurity Director

Recent articles

Memority et Stellantis : lauréats de la Cybernight
2024 !

Calendrier

December 16, 2024

Lors de la 4ème édition de la Nuit de la Cybersécurité au Théâtre Mogador, Stellantis et Memority ont remporté la médaille d'Or de la catégorie Co-Construction ainsi que le Prix du Public, devant plus de 1 000 professionnels et 4 000 votants.

L'ISO 27001 à l’heure du changement climatique

Calendrier

March 20, 2024

Le changement climatique entre désormais dans le périmètre de la norme ISO 27001. Un nouvel enjeu qui bouscule la gestion des risques, la gouvernance et la stratégie des organisations face aux défis environnementaux et numériques.

Le modèle de rôle - Épisode 2 : publication et assignation

Calendrier

April 8, 2024

Dans cet article, découvrez deux grands principes du modèle de rôle et leurs bénéfices : l'assignation et la publication.