What is Identity Management?

Identity Management (IdM) is the process by which organisations manage the digital identities of users and systems throughout their entire lifecycle: from creation, modification and use through to deletion.

Identity management ensures that only authorised people have access to information and systems — and that this happens in a controllable and verifiable manner.


🧠 Why is identity management important?

Reason Explanation
Security Prevents unauthorised access to systems and data
Compliance Meeting requirements from BIO, AVG, ISO 27001
Traceability Every action can be traced back to an individual user
Efficiency Users obtain the right access immediately upon hire
Risk management Minimises the risk of misuse of permissions or accounts

🔁 Lifecycle of an identity

  1. Provisioning
    – An identity is created at the start of employment or onboarding

  2. Modification
    – Roles or departments change, leading to adjusted permissions

  3. Granting/withdrawing access
    – Permissions assigned based on function or necessity (need-to-know)

  4. Deactivation/removal
    – On departure, project closure or aberrant behaviour

This cycle is often automated via an Identity & Access Management (IAM) system.


🛠 Components of identity management

Component Description
Digital identity A unique account linked to a person, system or role
Authentication Confirmation of identity (password, token, biometrics)
Authorisation What is someone allowed to do? See also access management
Roles & groups Structuring access on the basis of function or profile
Logging & auditing Insight into who has done what, and when
Self-service portals Users can reset passwords or request access

🔐 Linkage with security

Security principle Application within identity management
Security by Design IdM must be integrated into processes and systems from the design stage
Least Privilege Users receive only the minimum permissions they need
Zero Trust Authentication and authorisation are re-evaluated per session and context
Multi-factor authentication Additional security through a second factor at login
Security policy Policy defines requirements for passwords, roles, logging

🏭 Identity management in OT environments

In OT (Operational Technology), identity management is often less mature, but essential:

OT-specific aspect Management point
Access to SCADA systems Based on personal logins, no shared accounts
Engineering stations / PLCs Separate accounts for programmers and operators
Physical access to installations Integration of badge systems or biometrics into access management
Legacy systems Often limited IdM: compensate with network segmentation and logging

Identity management in OT is a prerequisite for IEC 62443 compliance and risk management.


🔗 Relation to other topics

Related concept Relevance to identity management
Access management IdM provides the input: who gets which access?
Governance Determines who is allowed to decide on identity and access structures
Incident Response Plan Identity logs are crucial when investigating incidents
Continuity management Procedures for access in crisis situations

✅ Best practices

  • Automate where possible (IAM tools)
  • Use unique, personal accounts — never shared
  • Integrate HR systems with your IdM process (joiners/leavers)
  • Implement role-based access (RBAC or ABAC)
  • Carry out periodic reassessment of access rights (recertification)

📌 In summary

Identity management is the foundation of access control and information security.
Without well-organised identity management, shadow access, lack of accountability and risk of misuse arise — particularly in complex IT and OT environments.