Identity Management is the formalised technical process of managing the full lifecycle of digital identities for unique users, devices, and automated services. The Primary Implementation Requirement involves provisioning a centralised identity registry and RBAC mapping under Annex A 5.16, delivering the Business Benefit of 60% reduced unauthorised access risk and 100% accountability logs.
What is Identity Management?
Identity management is the process of managing and controlling who has access to what within a system. Think of it like a digital key master who makes sure the right people get the right keys to the right doors. It ensures that only authorised users can access specific resources, like files or applications, and it keeps track of what they do. This is a key part of information security.
Examples
- Logging in to a computer: When you type in your username and password, you are using a form of identity management. The system checks if your identity (username) and secret (password) are correct before letting you in.
- Online banking: Your bank uses identity management to make sure that only you can see your account balance and make transactions. They might even use extra steps, like sending a code to your phone, to be extra sure it’s you.
- Social media: When you sign up for a social media site, you create a profile, which is your digital identity. The site then uses this identity to control what you can see and do.
Context
In simple terms, identity management is about knowing who’s who in a digital world. It’s not just about a username and password. It’s about a complete system that manages all the identities of people and devices. This includes things like:
- Authentication: Proving you are who you say you are. This can be done with a password, a fingerprint, or a face scan.
- Authorization: Deciding what you’re allowed to do once you’re in. For example, a student can view their grades but not change them.
- User provisioning: Creating and deleting user accounts as needed. When a new employee starts, an account is created. When they leave, it’s deleted.
The goal is to keep systems safe and make sure the right people can do their jobs without a hassle.
How to implement Identity Management
1. Provision a Centralised Identity Registry
- Provision a single source of truth for all digital identities: Identify 100 per cent of users, devices, and automated service accounts, resulting in a defined technical boundary for identity governance.
2. Formalise Identity Verification Protocols
- Formalise strict registration requirements for new identities: Verify legal evidence of identity before account creation, resulting in the technical prevention of fraudulent or “ghost” accounts within the ISMS.
3. Document Identity Rules of Engagement (ROE)
- Document the technical Rules of Engagement for identity lifecycle management: Establish granular technical protocols for Joiners, Movers, and Leavers (JML), resulting in authorised technical conduct across all departments.
4. Provision Unique Identifiers for All Entities
- Provision non-reusable, unique IDs for every person and service: Prohibit the use of shared accounts, resulting in 100 per cent non-repudiation and clear audit logs for every system action.
5. Enforce Multi-Factor Authentication (MFA) Standards
- Enforce MFA across all system boundaries and privileged accounts: Mandate strong authentication for 100 per cent of remote and administrative access, resulting in a primary technical barrier against credential theft.
6. Formalise Role-Based Access Control (RBAC) Mapping
- Formalise technical roles linked to specific job functions: Map identity attributes to granular system permissions, resulting in the automatic application of the principle of least privilege.
7. Provision Automated Account Provisioning Workflows
- Provision scripted workflows for account setup and modifications: Automate the delivery of access based on HR triggers, resulting in reduced human error and consistent configuration of identity metadata.
8. Audit Identity Metadata and Attributes Regularly
- Audit 100 per cent of identity attributes including group memberships and permissions: Execute quarterly reconciliations, resulting in the identification and removal of “privilege creep” as staff change roles.
9. Revoke Identities for Leavers within 24 Hours
- Revoke access and disable identities immediately upon termination: Execute a formal technical sunsetting process for leavers, resulting in the technical elimination of orphaned accounts and lateral movement risks.
10. Audit the Identity Lifecycle via Logs
- Audit the effectiveness of identity controls through independent log review: Analyse sign-in patterns and management changes, resulting in a documented corrective action plan that ensures continuous improvement of the ISMS.
Identity Management FAQ
What is Identity Management in the context of ISO 27001?
Identity Management is the formalised technical process of managing the full lifecycle of digital identities for 100% of users, devices, and services within an organisation. Required by ISO 27001 Annex A 5.16, it ensures that only unique, verified identities are provisioned, resulting in a secure foundation for access control and accountability.
What are the primary components of an Identity Management lifecycle?
A robust Identity Management framework typically involves four modular stages to ensure technical integrity:
- Registration: Verifying 100% of identity claims before account creation.
- Provisioning: Assigning unique identifiers and technical attributes based on roles.
- Maintenance: Updating identity metadata and performing annual user access reviews.
- De-provisioning: Revoking 100% of access within 24 hours of staff departure to prevent “orphaned accounts.”
What is the difference between Identity Management and Access Control?
Identity Management focuses on identifying “who” a user is, whereas Access Control determines “what” that identified user is allowed to do. While they are related, Identity Management handles the technical creation of the digital persona (100% identification), while Access Control manages the granular permissions linked to that persona, satisfying ISO 27001 Annex A 5.15 and 5.16.
What are the business benefits of implementing formal Identity Management?
Implementing formal Identity Management reduces the risk of unauthorised access by approximately 60% and significantly lowers administrative overhead. Statistics show that organisations with automated de-provisioning are 85% less likely to suffer from data breaches caused by former employees, effectively protecting against the global average breach cost of £3.4 million.
How does a Lead Auditor verify Identity Management compliance?
Lead Auditors verify compliance by sampling 100% of the Joiners, Movers, and Leavers (JML) process logs. They seek technical evidence of unique identification, proof of identity verification, and verification that administrative roles are assigned only to verified individuals, ensuring alignment with ISO 27001 Clause 7.5 and Annex A 5.16.
Relevant ISO 27001 Controls
| Related ISO 27001 Control | Relationship Description |
|---|---|
| ISO 27001 Annex A 5.16: Identity Management | Core Requirement: The primary control governing the full lifecycle of digital identities, including the processes for creating, maintaining, and deleting user identities and their associated attributes. |
| ISO 27001 Annex A 5.15: Access Control | Operational Integration: Identity management provides the “who,” while access control uses that identity to enforce rules on what resources the user can actually reach. |
| ISO 27001 Annex A 5.17: Authentication Information | Verification Mechanism: Governs the management of secrets (passwords, certificates, biometric data) used to prove the identity managed within the system. |
| ISO 27001 Annex A 5.18: Access Rights | Provisioning Link: Ensures that the identities managed in the system are assigned specific permissions that are regularly reviewed and updated based on the user’s role. |
| ISO 27001 Annex A 8.2: Privileged Access Rights | Critical Oversight: A specialized subset of identity management focused on highly powerful accounts (like “admin” identities) that require stricter controls and logging. |
| Glossary: Confidentiality | Security Objective: Identity management is a vital tool for maintaining confidentiality, ensuring that sensitive information remains hidden from unauthorized or unverified users. |
| Glossary: ISMS | System Foundation: Identity management is a foundational technical process within the Information Security Management System (ISMS) used to mitigate unauthorized access risks. |
| ISO 27001 Glossary of Terms (Main Index) | Parent Directory: The central index where Identity Management is categorized among other essential access and identity-related terminology. |
The Tools We Use.
100% Audit Success. Zero AI Guesswork.
