Identity and Access Management (IAM): The Complete Guide for Security and Compliance Teams
2026-03-08
By Emre Salmanoglu

Identity and Access Management (IAM): The Complete Guide for Security and Compliance Teams

Learn how to implement identity and access management that satisfies ISO 27001, SOC 2, NIS2, and DORA. Covers SSO, MFA, RBAC, ABAC, privileged access, identity governance, and audit evidence.

IAM
identity management
access control
MFA
compliance

What Is Identity and Access Management?

Identity and Access Management (IAM) is the discipline that ensures the right people have the right access to the right resources for the right reasons. It encompasses the policies, processes, and technologies that manage digital identities and control access to organisational systems and data throughout the entire identity lifecycle.

A mature IAM programme moves beyond simple user accounts and passwords to implement centralised identity governance, risk-based authentication, fine-grained authorisation, and continuous access monitoring.

IAM Core Components

ComponentWhat It DoesCompliance Value
Identity lifecycle managementProvisioning, modification, and deprovisioning of accountsJoiners/movers/leavers evidence
AuthenticationVerify user identity (passwords, MFA, biometrics, certificates)Strong authentication evidence
Single sign-on (SSO)One authentication grants access to multiple applicationsCentralised access control
AuthorisationDefine and enforce what authenticated users can accessLeast privilege evidence
Access reviewsPeriodic verification that access remains appropriateRecertification evidence
Privileged access managementControl and monitor administrative and elevated accessPrivileged access evidence
Directory servicesCentral identity store (Active Directory, Entra ID, Okta)Identity source of truth
Audit loggingRecord all authentication and access eventsAudit trail evidence

Authentication Methods

MethodSecurity LevelUser ExperienceBest For
Password onlyLowModerate frictionLegacy systems (not recommended)
Password + SMS OTPMediumModerate frictionBasic MFA compliance
Password + authenticator appHighModerate frictionStandard MFA
Password + hardware token (FIDO2)Very highLow friction after setupHigh-security environments
Passwordless (FIDO2/passkeys)Very highLow frictionModern applications
Certificate-basedVery highTransparent after setupMachine identities, VPN
Biometric + device bindingVery highLow frictionMobile and privileged access

Authorisation Models

ModelHow It WorksProsCons
RBACAccess based on assigned rolesSimple, auditable, well-understoodRole explosion in complex orgs
ABACAccess based on attributes (user, resource, context)Fine-grained, context-awareComplex to implement and audit
PBACAccess based on policies combining roles and attributesFlexible, centrally managedPolicy management overhead
ReBACAccess based on relationships between entitiesNatural for hierarchical dataNewer, less tooling support
Just-in-time (JIT)Temporary elevated access on requestMinimises standing privilegesRequires approval workflows

Identity Lifecycle Management

PhaseActivitiesKey Controls
JoinerCreate identity, assign role-based access, provision accountsAutomated provisioning from HR system
MoverUpdate access when role or department changesAccess review triggers on role change
LeaverDisable accounts, revoke all access, recover assetsAutomated deprovisioning within 24 hours
ContractorTime-bounded access with expiry datesAuto-expire access, no permanent accounts
Service accountNon-human identities for system-to-system communicationOwnership assignment, rotation, monitoring

Access Review Best Practices

Review TypeScopeFrequencyReviewer
User access reviewAll user permissions across systemsQuarterlyLine managers
Privileged access reviewAdmin and elevated accountsMonthlySecurity team + system owners
Service account reviewNon-human accounts and API keysQuarterlySystem owners
Application entitlement reviewFine-grained permissions within applicationsSemi-annuallyApplication owners
Terminated user auditVerify all access removed for departed usersMonthlyHR + IT

Compliance Requirements

Framework Mapping

RequirementISO 27001SOC 2NIS2DORA
Access control policyA.5.15CC6.1Art. 21(2)(d)Art. 9(4)(a)
User registration/deregistrationA.5.16CC6.2Art. 21(2)(d)Art. 9(4)(a)
Provisioning of access rightsA.5.18CC6.2Art. 21(2)(d)Art. 9(4)(a)
Review of access rightsA.5.18CC6.2Art. 21(2)(d)Art. 9(4)(b)
Multi-factor authenticationA.8.5CC6.1Art. 21(2)(d)Art. 9(4)(d)
Privileged access managementA.8.2CC6.1Art. 21(2)(d)Art. 9(4)(c)
Least privilegeA.8.2CC6.1Art. 21(2)(d)Art. 9(4)(a)
Authentication managementA.8.5CC6.1Art. 21(2)(d)Art. 9(4)(d)

Audit Evidence

Evidence TypeDescriptionFramework
Access control policyDocumented policy with roles, responsibilities, and proceduresAll frameworks
User provisioning recordsTickets/workflow showing approval and provisioningISO 27001, SOC 2
Access review reportsCompleted quarterly review with decisions and actionsAll frameworks
MFA deployment reportCoverage across all users and systemsAll frameworks
Deprovisioning evidenceTimely access revocation for terminated employeesAll frameworks
Privileged account inventoryList of all admin accounts with justificationISO 27001, SOC 2, DORA
SSO configurationCentralised authentication for all applicationsSOC 2
Password policyDocumented policy meeting framework requirementsAll frameworks

Common Mistakes

MistakeRiskFix
No automated deprovisioningFormer employees retain accessIntegrate IAM with HR system for automated offboarding
Shared accountsNo individual accountabilityEliminate shared accounts, use individual identities
No MFA on critical systemsAccount compromise via credential theftEnforce MFA everywhere, prioritise privileged access
Stale access accumulatesUsers collect unnecessary permissions over timeImplement quarterly access reviews with remediation
No service account governanceOrphaned service accounts with broad accessAssign owners, implement rotation, monitor usage
Manual provisioningSlow, error-prone, no audit trailAutomate provisioning via IAM platform
Password-only authenticationEasily compromised through phishingDeploy passwordless or strong MFA

How Orbiq Supports IAM Compliance

Orbiq helps you demonstrate identity and access management controls:

  • Evidence collection — Centralise access review reports, MFA deployment evidence, and deprovisioning records
  • Continuous monitoring — Track IAM control effectiveness and compliance rates
  • Trust Center — Share your IAM posture via your Trust Center
  • Compliance mapping — Map IAM controls to ISO 27001, SOC 2, NIS2, and DORA
  • Audit readiness — Pre-built evidence packages for auditor review

Further Reading