My commitment as CISO
On the occasion of Cybermoi/s 2024, European Cybersecurity Month, I would like to share my belief in the importance of identity and access management (IAM) solutions for securing our digital environment.
As CISO at Memority, I am convinced that adopting these solutions is essential to protecting the sensitive information of our company and our customers. Here are four IAM best practices that I encourage all companies to adopt to strengthen their security.
IGA: a fundamental pillar of IAM
Identity Governance and Administration (IGA) is the central component of a successful IAM strategy. It is essential for establishing rigorous access control within an organization. By implementing clear rules and role assignment processes, I ensure that every user, employee, partner, or connected object has the appropriate access rights. At Memority, IT, our platform, and HR systems are an integral part of this management, providing a comprehensive overview of access. With this increased visibility, companies can justify who accesses which resources and why.
It also reduces internal risks by limiting access rights according to the principle of least privilege. This principle ensures that each employee or partner has only the rights necessary to perform their tasks, thereby reducing the impact of accidental or malicious compromise. It is also essential to remember the importance of audits and access reviews. It is now possible to automate these operations, which were previously very costly in terms of resources.

Furthermore, IGA plays a crucial role in regulatory compliance. It not only helps meet the requirements of privacy laws, with GDPR at the forefront, but also other regulations such as NIS2 or DORA, as well as numerous standards like ISO27001, ISO27701, and SecNumCloud that we implement at Memority, by ensuring full traceability of user access and actions.
Why do I recommend IGA?
- Centralized and efficient identity management
- Guaranteed compliance through regular reviews
- Enhanced access control
Single Sign-On (SSO) and Identity Federation: simplifying access
In an environment where a multiplicity of applications and systems is the norm, Single Sign-On (SSO) and identity federation are essential solutions to simplify access while increasing security.
SSO allows users to authenticate once to access a set of applications. This significantly reduces risks related to password management. Fewer passwords to remember means less risk of insecure behavior (use of simple or reused passwords, inattentiveness during prompts, etc.). In addition to simplifying the user experience, this approach reduces the number of password reset requests, thus freeing IT teams from repetitive tasks.
The implementation of Single Sign-On (SSO) in all companies is highly recommended. This approach simplifies users' lives by allowing them to access all their applications with a single credential. This reduces the stress associated with managing multiple passwords and decreases the associated security risks.
The advantages of this practice:
- Secure and seamless access for all users
- Fewer password-related issues
- Simplified management for external identities
Multi-Factor Authentication (MFA) and Adaptive Authentication: strengthening security
I cannot emphasize enough the importance of Multi-Factor Authentication (MFA) for securing critical access points. This method adds a layer of security by requiring multiple forms of identification, a crucial approach in today's cyber-threat landscape.
Implementing Multi-Factor Authentication (MFA) is one of the most effective measures for protecting user accounts. By combining several authentication factors (for example, a password and validation via a mobile device), MFA makes hacking attempts significantly more complex.
By integrating Risk-Based Authentication (RBA) solutions, I ensure that the risk of each access attempt is evaluated in real-time and that the appropriate authentication method is applied.
The integration of MFA and adaptive authentication thus reinforces system protection while ensuring flexibility to adapt to specific situations. On the Memority platform, these solutions apply to employees as well as partners, customers, and even connected objects.
Numerous benefits:
- Reduced risk of unauthorized access
- Dynamic security based on access context
- Increased protection for users, connected objects, and corporate resources
Identity as a Service (IDaaS): the key to efficiency
Adopting an Identity as a Service (IDaaS) approach is a strategic choice I recommend. This approach centralizes IAM management in the cloud, facilitating secure access to resources regardless of their location. This proves particularly useful in a society where remote work and operational flexibility have become commonplace.
The main advantage of the IDaaS model is its scalability. It easily adapts to company growth or changes without requiring additional infrastructure. It also allows you to benefit from the advantages described above "à la carte" without having to plan new deployments. Companies can thus focus on their core business while benefiting from modular, state-of-the-art identity management. Furthermore, the IDaaS model allows for easy integration of SSO, MFA, and federation solutions, offering unified access management even on a very large scale.
Finally, with Memority IDaaS, we benefit from a unified platform to manage all users, whether they are employees, partners, or customers: thanks to a self-service portal, users can autonomously manage their access and track their authentications, thereby reducing the workload for IT teams.
The benefits I observe:
- Simplified, scalable, and agile identity management
- A reduction in costs associated with access management
- An improved user experience thanks to self-service options
In conclusion
Often overlooked or equated with complex management, IAM is undeniably the cornerstone of corporate security in the digital age. By implementing solid IDaaS solutions, including IGA, SSO, identity federation, and multi-factor and adaptive authentication, companies strengthen their security while simplifying identity and access management. These best practices apply to all profiles—employees, partners, customers, citizens, or connected objects. They guarantee an optimized user experience while protecting information systems against current threats.
On the occasion of Cybermoi/s 2024 (Cybersecurity Month), it is imperative to remember that identity management is a major issue impacting all levels of the organization. Whether you are a CEO, CISO, CIO, member of the IT team, or any other user, these IAM practices contribute to reinforced cybersecurity and better risk management.




