Two Musts for Managing a Remote Workforce: Identity Governance and Lifecycle

Rethinking These Familiar Terms to Address New Ways of Working


Identity governance and lifecycle have always been fundamental to controlling user access and visibility into access activity in the workplace. But in a time when “the workplace” has been recast to mean every user’s home and a multitude of devices (including personal devices), these capabilities take on new meaning and importance. Identity governance suddenly isn’t just about who has access to what; it’s about where, how and why they have access. The meaning of identity lifecycle must be expanded, too, in light of the need to be concerned not just about securely enabling access to data, but about doing so when users aren’t inside a protected physical environment. Let’s look at some real-world examples of the identity management challenges remote work is creating, and at what it means to rethink identity governance and lifecycle to meet those challenges. 


Identity Governance: Why It’s Different When Everyone’s Home (and What to Do About It)


Back when the majority of the workforce was literally “at work,” in the sense of being in a physical office space, we didn’t have to give nearly as much thought to where, how or why people were accessing systems and information, particularly sensitive information such as financial or health records. After all, they were doing it within a protected perimeter, on secure systems. And even if there was some remote work, it often only applied to only a relative few. But now that all the people who were in the office are at home, the where, how and why of access have become critical considerations for governance. For example, what about people in call centers who have traditionally been prohibited from even bringing their personal phones to ..

Support the originator by clicking the read the rest link below.