We are a few months away from 2023 and Bahaa Abdul Hadi felt that this is the right time to look at the trends in identity management likely to hold good next year. Knowing this trends is important for all companies working in this domain.

The Trends in IAM for 2023

1. Cloud IAM

The adoption of cloud has been happening very quickly the pandemic accelerated the process. The growth of remote working led to companies using cloud options. Cloud IAM has also become the need of the hour. Cloud-managed tools for IAM are being used. Large companies like Microsoft and IBM are even offering specific services for specific industries. Cloud IAM is now specifically available for vertical like healthcare and financial.

2. Decentralized Identity

This trend that is likely to become popular envisages the use of an identity wallet. Such a wallet works on the blockchain model. It would involve protecting the privacy of user’s data during the authentication process. Thereby, third parties will not gain access to user data. A major benefit of decentralized identity is that it does away with need for multiple identities. This ensures convenience for users. For companies it represents reduce compliance since users manage their data through the wallet.

3. Managed IAM

Managing identity access is not so easy. It calls for proficiency in certain skills. Not all companies have employees with such skills. Employing IAM skilled people may cost money and involves a lot of complexities. This is why companies are slowly moving towards a managed IAM. Outsourcing IAM makes sense since it allows a MSSP (Managed Security Service Provider) to handle issues like continuous verification, account compromise, and threat intelligence.

4. Continuous verification

A very important trend in IAM that has been described as a permanent trend is continuous verification. It is a key concept used in the zero-trust model. It involves carrying out a continuous verification of the user to ensure that the person logged in is the same person. For example, a person steps away from his system and comes back to do a banking transaction.

There is a possibility that someone else may have stepped in. Continuous verification ensures the user is re-authorized, so the transaction can be done. After from verification of persons, it is important to verify identity of machines and applications. Many vendors are now in this field and offering services to help organizations implement continuous verification. It also includes analyzing user behavior to detect unnatural behavior and actions.

Thank you for your interest in Bahaa Abdul Hadi blogs. For more information, please stay tuned to www.bahaaabdulhadi.com