Close

See How Your Peers Are Moving Forward in the Cloud

New research from CDW can help you build on your success and take the next step.

Dec 20 2024
Security

Why Identity Governance Should Be the First Step in Developing an IAM Strategy

Identity and access management implementations must start with a comprehensive understanding of users and permissions.

Identity and access management (IAM) in higher education is a complex undertaking. There are different users with different roles that sometimes overlap, and identities can cross departments, colleges and campuses. Redundancies, outdated information and incorrect privileges run rampant when proper governance methods are not in place. It’s important for higher ed IT leaders to understand who is using their services and the level of access each user needs.

As IT professionals, we know multifactor authentication is the best way to secure a system. But getting identity governance and administration (IGA) under control is a key first step before diving into an MFA solution. MFA is only secure if the correct privileges are set, and that can only be done when an IT department understands where its users are and what their level of access should be. Often, institutions that adopt MFA do so on a smaller scale, starting with a smaller subset of users. The larger the MFA implementation, the more control an institution needs over its identity governance.

Click the banner below to learn more about identity and access management solutions.

 

Navigating the Complexities of Higher Ed User Identities

Like other large enterprises, higher education institutions have complex directories with thousands of users with varying levels of permissions. The added challenge for colleges and universities is to identify and manage multiple identities within a single person.

For example, a graduate student who works as a teaching assistant might need a different level of access to student and learning management systems than someone who is solely a graduate student. Alumni might have basic access to their university email accounts or cloud drives, but if an alum returns to campus as a student years later, then their level of access changes.

Data systems in higher education are typically siloed, and different colleges or departments might have their own registries. When this is the case, students or faculty can appear in multiple locations, giving them more than one identity within the institution. A student with a double major could have individual identities in both the college of engineering and the college of medicine. A faculty member who teaches biology but also graduated from the school a decade earlier could have separate faculty and alum identities.

DISCOVER: Securing your multifactor authentication solution can better position you against threats.

This is not to say that a decentralized approach to IGA is the wrong one. There are logical reasons for institutions to have isolated registries across colleges and departments, especially if each registry represents a different business unit. The important factor is for IT departments to understand the different registries and what the authoritative sources are.

Identity Governance and Access Management Solution Challenges

So, why do higher education institutions have a hard time with IGA? Much like any large-scale technology initiative, these undertakings require time, money, expertise and staff. For institutions that are working with small staffs under tight budgets, it can be difficult to find the time or resources needed to get IGA under control.

Virtual directory tools can help institutions correlate and centrally aggregate identities, allowing for a unified view of all of an institution’s registries and authoritative sources. This can be instrumental in moving to the next step of implementing an IAM solution. There is an upfront cost to these virtual directories, but efficiencies gained in maintenance down the line will likely offset these costs.

CONTINUE READING: Find out what higher education institutions need to know about zero trust.

It can also be beneficial for institutions to engage a third party when adding an identity solution, which requires a level of training many university IT departments do not have. At CDW, we can work with IT departments to deploy identity solutions, then walk staff through our configuration, explain our reasoning, and leave behind materials for them to reference as they maintain the system or troubleshoot issues. We also offer managed services, where we take care of maintenance after deployment. This option can be the most cost-effective for IT departments unable to hire or train the staff needed to maintain these environments.

A comprehensive IAM strategy could be the best defense against cybercrime targeting higher ed institutions, but without proper governance and insight into users and their identities, university IT departments could leave themselves vulnerable to threats.

This article is part of EdTech: Focus on Higher Education’s UniversITy blog series.

tsingha25 / getty images