IAM and CIEM Boost Network Security and 360-Degree VisibilityIAM and CIEM Boost Network Security and 360-Degree Visibility
Companies want 360-degree visibility into their networks and user activities, without sacrificing granularity. Can they have both?
February 14, 2025
![Person touching virtual screen to scan fingerprints, digital transformation management concept. Internet of Things, Big Data and Business Processes Person touching virtual screen to scan fingerprints, digital transformation management concept. Internet of Things, Big Data and Business Processes](https://eu-images.contentstack.com/v3/assets/bltde8121fc52c5c8f3/bltb99c1bbb95cd86b0/67af51ddfa3009fb6156e771/2JT4CKB.jpg?width=1280&auto=webp&quality=95&format=jpg&disable=upscale)
Companies are deploying identity and access management (IAM) at a record pace as they seek ways to harden their network security. According to market research firm Statista, the global IAM market is projected to grow to $43.1 billion by 2029 -- a significant jump from the $16 billion in revenue the industry recorded in 2022.
IAM lets companies dictate who can tap into IT resources by applying access and permission rules. These rules restrict access to only those users properly authorized to do so.
For all its utility, however, IAM's effectiveness diminishes as more of IT migrates to cloud providers. Most businesses already use more than one cloud provider to deliver services.
A major benefit of IAM is it gives IT staff a 360-degree view of user access and permissions across internal and cloud-based networks. But when a company has multiple cloud providers, IAM doesn't provide the same level of information -- particularly when users cross into multiple clouds for different activities.
The implication is that IAM can go only so far.
IAM has limited visibility
Despite its benefits, IAM is limited in tracking real-time identity access on the cloud. It's also challenged when tracking usage anomalies as they occur, thus precluding any immediate response.
Let's examine a business hypothetical.
XYZ Co. designs jet propulsion systems. It uses a supplier management system hosted by a SaaS provider and keeps its engineering and product development information on a separate cloud.
A purchasing agent at XYZ works daily with suppliers, sourcing critical components for product builds. This agent's identity access credentials allow them to interact with suppliers, negotiate contracts and place orders. Sometimes they need to substitute a particular component when the preferred component is unavailable. When that happens, the purchasing agent gets on the phone or communicates through email with the engineering and manufacturing design teams to confirm that the substitute component will work.
One day, however, a problem occurs. The agent needs to order a substitute component, but nobody is available in the engineering and manufacturing team. Instead, the agent accesses the engineering team's database in the separate cloud. The agent isn't authorized to do so, but they succeed nonetheless. Once on the engineering cloud, they drill down into a bill of materials for the product, isolate the part and pull up the specs to check for compatibility.
On the surface, the act seems innocent enough. But what if the same purchasing agent also decides to tap into new product development data on the engineering cloud and sells the information to a competitor? An IAM system with limited visibility could easily miss this cross-cloud activity and has few means to track or document it.
Finding a place for CIEM
Enter cloud infrastructure entitlement management (CIEM). CIEM lets companies monitor all user activities across multiple clouds while providing granular views. The sector is also growing fast, with a projected compound growth rate of 44% between now and 2028, according to Markets and Markets.
So what can network managers do if they want CIEM to become part of their network security framework but currently only work with IAM? For many companies, using both IAM and CIEM will work. IAM vendors are also beginning to incorporate CIEM into their product suites, which has some long-term implications for costs and training.
IAM and CIEM considerations for network managers
As more enterprises adopt CIEM, consider the three following issues:
1. Architecture and integration
How will you architect the combination of IAM and CIEM? In most cases, IAM is the foundational platform because it can track both on-premises and cloud users. CIEM, by its very nature, is cloud-only.
A proper IAM/CIEM integration lets you see -- and act -- in both environments through a single pane of glass. As more IAM vendors build CIEM into their product portfolios, integration challenges should ease.
2. CIEM security technologies
When IT staff adopt CIEM, they must master a new set of network observability and security tools. CIEM allows staff to monitor and respond to on-cloud user identity access issues, track activities, log audit trails and produce reports on user cloud activities.
3. Cooperation with cloud providers
Each cloud service has its own set of security management tools, and implementing CIEM doesn't change that. Network staff must familiarize themselves with the various security tools employed by each cloud provider and ensure they dovetail with their organization's internal policies and procedures.
About the Author
You May Also Like