Page 147 - Cyber Defense eMagazine April 2023
P. 147
identities of individuals and entities who need to access resources, ensuring they have the appropriate
level of access based on their roles and responsibilities.
IAM also involves authentication and authorization mechanisms, which verify user identities and control
their access to resources. Its solutions typically involve the following components:
• Identity Governance and Administration (IGA): IGA involves managing the life cycle of digital
identities, ensuring user identities are accurate, up-to-date and aligned with organizational
policies and procedures.
• Authentication: Authentication mechanisms verify the identity of users before they can access
resources. Common authentication mechanisms include passwords, biometrics, smart cards and
tokens.
• Authorization: This controls user access to resources based on their roles and responsibilities.
Authorization mechanisms include role-based access control (RBAC), attribute-based access
control and mandatory access control.
• Single Sign-On (SSO): SSO enables users to access multiple resources using a single set of
credentials, streamlining the authentication process, and reducing the risk of password fatigue
and unauthorized access.
• Identity and Access Analytics: This provides insights into user behavior, enabling organizations
to identify anomalies, suspicious activity and potential security threats.
How IAM Can Help Protect Against Insider Threats in Health Care
By implementing a robust IAM framework, health care organizations can offer training to reduce the
25.9% turnover rate, control who has access to what resources, and monitor and manage access in real-
time, reducing the risk of insider threats. Here are some specific ways in which IAM can help protect
against insider threats in health care.
1. Access Control
Health care organizations can manage access in real-time and regulate who has access to what
resources, thanks to IAM. They can also lower the risk of data breaches and theft by adopting access
controls to ensure only authorized individuals can access critical data and systems. For instance, health
care organizations can use RBAC to assign access permissions based on predetermined roles, verifying
users can only access the resources they need to perform their jobs.
2. Identity Governance and Administration
By implementing IGA, organizations can make sure only authorized personnel can access sensitive data
and systems. For example, health care organizations can use IGA to manage user accounts and
permissions, ensuring profiles are only created for authorized personnel.
147