Skip to content

Services, Wiki-Artikel, Blog-Beiträge und Glossar-Einträge durchsuchen

↑↓NavigierenEnterÖffnenESCSchließen
Identity & Access Management Glossary

Identity Governance and Administration (IGA) - Wer darf was und warum?

Identity Governance and Administration (IGA) manages digital identities, access rights, and their lifecycles: Joiner/Mover/Leaver processes, Role-Based Access Control (RBAC), access reviews (regular revalidation of permissions), Segregation of Duties (SoD) – dual-control principle at the system level, recertification campaigns, audit trail for compliance. Products: SailPoint IdentityNow, Saviynt, One Identity, Microsoft Entra ID Governance.

Identity Governance answers every company’s most critical questions: Who has access to what? Why does this person have this access? And is it still needed? Without IGA, “permission ghost towns” emerge—rights accumulated over years that no one checks anymore.

Joiner-Mover-Leaver Process

The identity lifecycle covers three critical events:

Joiner (New Hire)

When HR reports a new hire, an IGA trigger is automatically activated. Template-based role assignments ensure that a new “Sales Trainee” immediately receives standard permissions on their first day of work: email, Teams, CRM read access, and other role-specific access rights. An approval workflow ensures that the manager confirms the access request.

Mover (Transfer/Role Change)

When an employee changes departments, an HR action triggers an IGA trigger again. Old permissions from the previous role are revoked, and new permissions for the new role are granted. A short transition period of up to one to two weeks is acceptable in this case.

Common Mistake – Privilege Creep: In practice, the mover often retains all old permissions in addition to the new ones. After three transfers, the person has accumulated the permissions of all departments involved. This creeping accumulation of permissions is one of the most common security issues in mature IT environments.

Leaver (Departure)

Upon termination, an IGA trigger must be activated immediately. On the last day of employment, the account is deactivated—not deleted, as the audit trail and archived emails must be retained. Final deletion occurs after 30, 60, or 90 days, in accordance with policy.

The offboarding checklist includes:

  • AD account deactivated
  • Exchange mailbox switched to shared mailbox
  • VPN access blocked
  • MFA token revoked
  • SSH keys removed
  • PAM accounts deactivated
  • External SaaS access (Salesforce, GitHub, etc.) removed

Role-Based Access Control (RBAC) and Role Mining

RBAC Hierarchy

RBAC follows the principle: User → Role → Permission. A structured example for Sales:

"Junior Sales" role:

  • CRM: Read and Write (own deals)
  • ERP: Create quotes
  • Email and Teams: Standard

"Senior Sales" role:

  • All of Junior’s permissions
  • CRM: Read all deals (not just their own)
  • ERP: Approve discounts up to 15%

"Sales Manager" role:

  • All of Senior’s permissions
  • CRM: Reports and Admin
  • ERP: Approve discounts up to 30%
  • Read personnel files (own employees)

Role Mining

Role Mining analyzes existing permissions and derives new roles from common patterns. An IGA tool automatically detects: “These 50 users all have the same 10 rights—that’s a new role.” Role Mining is the starting point for implementing RBAC in mature environments.

Segregation of Duties (SoD)

SoD prohibits critical permission combinations that would undermine the dual-control principle:

IncorrectCorrect
Same user creates and approves an orderRequest (User A) → Approval (User B)

Typical SoD conflicts that IGA must automatically detect and prevent:

  • Accounting: Create payment and approve payment
  • Purchasing: Create supplier and approve order
  • IT: Create admin account and audit security

IGA automatically enforces SoD: A detected conflict blocks the second permission. An override is only possible with additional approval and a documented justification.

Access Reviews (Revalidation)

Why Access Reviews?

  • Continuously prevent privilege creep
  • Meet compliance requirements: ISO 27001 A-8.2, SOX, GDPR, NIS2
  • Maintain least privilege during ongoing operations

Review Types

Manager Reviews (most common form): The manager reviews the access rights of all direct reports. The key question: “Does this employee still need this right?” Frequency: semi-annually; quarterly for critical systems. Actions: confirm, revoke, or delegate.

Owner Reviews: The application owner reviews all users of their application. The question: “Why does this user have this right in my app?” Particularly suitable for application-specific reviews.

Role Reviews: Reviewing who is in a privileged group (domain admins, Exchange admins, etc.). Frequency: monthly for privileged roles.

Automated Reviews: Automatic detection of locked-out users who still have rights, as well as users with "Leaver" status.

Review Process in the IGA Tool

  1. Campaign created: "Q3 2026 Access Review"
  2. Reviewer receives email: "You need to review 23 access rights"
  3. Self-service portal: confirm, revoke, or comment
  4. Escalation: after 7 days without action → automatic reminder
  5. No action after 14 days → auto-revoke (fail-safe!)
  6. Final report: e.g., 98% of rights confirmed, 23 revoked

IGA Products at a Glance

ProductPositioningStrengths
SailPoint IdentityNow (Cloud) / IdentityIQ (On-Prem)Market leader (Gartner MQ), for 2,000+ employeesAI-based role mining, very comprehensive
Saviynt Security ManagerMid-market and enterpriseCloud-native, combines IGA and PAM, good application governance
One Identity ManagerMicrosoft-centric environmentsGerman (Frankfurt), GDPR-native, strong AD/Azure AD integration
Microsoft Entra ID GovernanceMicrosoft shops (in the P2 bundle)Native in Azure AD/M365, cost-effective, but Azure/M365 only

Microsoft Entra ID Governance in Detail

Entra natively offers Access Packages (Entitlement Management), direct access reviews in Entra ID, PIM (Privileged Identity Management) for just-in-time access, and access expiration dates:

A sample access package called “Finance Access” bundles the SharePoint Finance site, Power BI workspace, and SAP Finance app into a single package that the manager must approve. After 90 days, access automatically expires and requires a new request.

Compliance Evidence with IGA

IGA provides concrete, auditable documents for audits:

ISO 27001 A-8.2 (Privileged Access Rights):

  • Evidence of who has privileged rights (IGA report)
  • Access reviews: Documentation of the last four quarters
  • SoD: Which conflicts were prevented or handled?

SOX (for publicly traded companies):

  • Complete audit trail for financial system access
  • Separation of Financial Duties fully verifiable
  • 100% auditable, zero exceptions without documentation

GDPR:

  • Data minimization: only necessary rights to personal data
  • Access reviews demonstrate the removal of unnecessary access rights
  • Justification: why does User X have access to customer data?

NIS2 (Art. 21):

  • Access management explicitly named as a mandatory measure
  • IGA documentation for security-critical systems and privileged rights

Typical Audit Questions and IGA Answers

Question: “Who had access to customer data in January 2026?” IGA Answer: Export of all access rights plus usage log for the period.

Question: “Do former employees still have active accounts?” IGA response: “Leavers with Active Accounts” report—empty means compliant.

Question: “Were rights revoked after a department transfer?” IGA response: Mover log: old rights X removed, new rights Y assigned on date Y.