Skip to main content
IGA - Identity Governance and Admin



IGA - Identity Governance and Admin

IGA is a component of an Identity Access Management (IAM) program that ensures only the right users are getting access to the right applications at the right time.  

IGA tools manage digital identity and access rights across multiple systems.  The more heterogeneous the environment in terms of applications and systems, the more complicated the challenge is for identity governance and administration.  Hence, there is often a need to procure an IGA tool to simplify identity management and help demonstrate compliance with regulations related to identity management as applicable.  Common functions of IGA include identity lifecycle and entitlement management (to keep track of the current role of each user and which applications they should have access to), automated workflows to manage access rights (to ensure necessary approvals are efficiently obtained for new service access requests), provisioning (to propagate changes initiated by the IGA tool to all the systems impacted), and auditing and reporting (to demonstrate the veracity of all the items above).  

Seeking Clarity?

View the Cybersecurity Dictionary for top terms searched by your peers.

Explore the Dictionary

Related Assets

October 01, 2018

5 Steps to a Successful IAM Deployment

Learn how to deploy a successful IAM solution with this interactive five step guide.

See Details

October 25, 2018

Identity and Access Management Assessments

Learn how we can help align your IAM programs with business goals and best practices.

See Details

Optiv Leadership Perspective – IAM as a Foundation for Security and Business Enablement

Bryan Wiese, Optiv VP and GM of Identity and Access Management, discusses the importance of identity and access management as a foundation for securit...

See Details

How Can We Help?

Let us know what you need, and we will have an Optiv professional contact you shortly.

Privacy Policy

Stay in the Know

For all the latest cybersecurity and Optiv news, subscribe to our blog and connect with us on Social.


Join our Email List

We take your privacy seriously and promise never to share your email with anyone.

Stay Connected

Find cybersecurity Events in your area.