RSA 2026Come see what your attackers already know→
GhostEye
PLATFORMCOMPANYRESOURCES
SCHEDULE DEMO

Find out who in your company is exposed.

PLATFORM

Overview

RESOURCES

BlogResearchEventsNewsProductGlossary

COMPANY

About
GhostEye
22 Vanderbilt Suite 7C
New York, NY 10017
founders@ghosteye.ai
Trust CenterHelp CenterSchedule DemoTerms of UsePrivacy Policy

© 2026 GhostEye, Inc. All rights reserved.

  1. ← Glossary
  2. /
  3. Identity and Access Management (IAM)

Identity and Access Management (IAM)

INFRASTRUCTURE
·3 min read·Updated Mar 2026

Identity and Access Management (IAM) is the security discipline responsible for ensuring that the right individuals have appropriate access to technology resources. IAM encompasses the policies, processes, and technologies used to manage digital identities and control how users are authenticated, authorized, and audited across an organization's systems, applications, and data..

What is Identity and Access Management?

Identity and Access Management (IAM) is the security discipline responsible for ensuring that the right individuals have appropriate access to technology resources. IAM encompasses the policies, processes, and technologies used to manage digital identities and control how users are authenticated, authorized, and audited across an organization's systems, applications, and data.

Core Components of IAM

ComponentFunction
Identity GovernanceDefines who should have access to what, based on roles and policies
AuthenticationVerifies a user's identity (passwords, MFA, biometrics)
AuthorizationDetermines what an authenticated user is allowed to do
ProvisioningCreates, modifies, and removes user accounts and access rights
Single Sign-On (SSO)Allows users to authenticate once and access multiple systems
Privileged Access ManagementControls and monitors elevated access to critical systems
Audit and ComplianceLogs and reviews access activity for security and regulatory requirements

Why IAM Matters for Human Risk

IAM is the control plane that determines the blast radius when an employee is compromised. If an attacker social engineers an employee with overly broad access permissions, the damage is exponentially greater than compromising someone with tightly scoped access. Human risk scoring should factor in IAM data - an employee's access level, the sensitivity of systems they can reach, and whether their permissions follow the principle of least privilege. Organizations that connect their IAM data to their human risk management platform can prioritize which employees need the most protection.

IAM and Social Engineering

Social engineering attacks frequently target IAM processes directly. Help desk vishing attacks manipulate agents into resetting passwords or disabling MFA. Phishing campaigns harvest credentials that grant access to IAM-protected systems. Business email compromise tricks employees into approving unauthorized access requests. Every IAM control is ultimately operated by a human - and that human is the target.

On this pageWhat is Identity and Access Management?Core Components of IAMWhy IAM Matters for Human RiskIAM and Social EngineeringFAQ

Frequently Asked Questions

What's the difference between authentication and authorization?

Authentication verifies that someone is who they claim to be (usually with passwords or MFA). Authorization determines what that verified person is allowed to do. You authenticate to prove your identity, then the system authorizes your access level.

How does IAM prevent social engineering damage?

When a social engineer compromises an employee, IAM controls determine how much they can access. An employee with tightly scoped permissions (least privilege) limits the attacker's blast radius. Employees with overly broad permissions multiply the damage.

Can attackers bypass IAM controls?

Yes. Attackers target the humans who operate IAM systems. Help desk vishing tricks agents into resetting MFA or disabling controls. Phishing harvests credentials that legitimate IAM systems then accept. The strongest IAM system is still operated by humans.

What's the connection between IAM and human risk scoring?

Human risk scoring should weight access levels heavily. An employee susceptible to phishing with admin access represents far greater risk than a non-technical user with read-only permissions. Connecting IAM data to risk scoring helps organizations prioritize protection.

Related Terms
Access ControlZero TrustMulti-Factor Authentication (MFA)Least PrivilegeHelp Desk VishingHuman Risk Scoring