CISSP · · 3 min read

Identity Governance and Administration: The Management Layer of IAM

IAM technology needs governance to be effective. Learn how access certifications, SoD enforcement, and role engineering turn tools into a coherent identity program.

Title

CISSP Lens: Pick answers that align business risk, governance intent, and practical control execution.

Identity Governance and Administration: The Management Layer of IAM

Hook / Why this matters

IAM tools can create accounts and enforce policies, but without governance they lack direction. Identity governance ensures that access decisions align with business goals, risk appetite, and compliance requirements. It is where technology, policy, and oversight meet.

Core concept explained simply

Identity Governance and Administration (IGA) combines two related functions:

Governance versus administration

Think of governance as deciding what should happen and administration as making it happen.

Both are necessary for a mature IAM program.

Access certification and attestation

Access certification campaigns ask managers, application owners, or data owners to review who has access to what and attest that it is still appropriate.

Good campaigns:

They act as detective and corrective controls for privilege creep and policy violations.

Segregation of duties enforcement

Segregation of duties (SoD) prevents conflicts of interest and reduces fraud risk by ensuring no single person can control all steps in critical processes.

IGA tools can:

Role mining and role engineering

Building effective role based access control often starts with role mining, analyzing existing entitlements to identify patterns.

Role engineering then refines these findings into roles that support least privilege and are manageable over time.

Identity analytics and risk scoring

IGA platforms increasingly incorporate analytics:

These insights guide where to focus governance efforts.

CISSP lens

For CISSP, IGA sits at the intersection of Domain 1 (governance) and Domain 5 (IAM).

Exam relevant themes:

You may see scenarios where audits find SoD violations or rubber stamped reviews. The right answer usually involves stronger identity governance, not just more technology.

Real world scenario

An external auditor reviewed a company's financial systems and found that more than 200 users had combinations of access rights that violated stated SoD policies. For example, some users could both create and approve vendor payments.

The company had RBAC in place, but there was no automated SoD checking during provisioning, and access reviews lacked context.

To address this, the organization implemented an IGA solution that:

Over time, SoD violations dropped, and audit findings shifted from major deficiencies to manageable issues.

Common mistakes and misconceptions

Actionable checklist

Key takeaways

Optional exam style reflection question

Question: An auditor reports that managers approve almost all access during annual certifications without meaningful review. What governance change would most improve the effectiveness of these certifications

Answer: Move to more frequent, smaller, risk based certification campaigns that provide richer context, such as usage data and risk scores, and require explicit decisions on high risk entitlements. This encourages real review instead of rubber stamping and focuses attention where it matters most.

Read next

© 2025 Threat On The Wire. All rights reserved.