Skip to main content
IGA - Identity Governance and Admin

IGA - Identity Governance and Admin


IGA - Identity Governance and Admin

IGA is a component of an Identity Access Management (IAM) program that ensures only the right users are getting access to the right applications at the right time.  

IGA tools manage digital identity and access rights across multiple systems.  The more heterogeneous the environment in terms of applications and systems, the more complicated the challenge is for identity governance and administration.  Hence, there is often a need to procure an IGA tool to simplify identity management and help demonstrate compliance with regulations related to identity management as applicable.  Common functions of IGA include identity lifecycle and entitlement management (to keep track of the current role of each user and which applications they should have access to), automated workflows to manage access rights (to ensure necessary approvals are efficiently obtained for new service access requests), provisioning (to propagate changes initiated by the IGA tool to all the systems impacted), and auditing and reporting (to demonstrate the veracity of all the items above).  

Seeking Clarity?

View the Cybersecurity Dictionary for top terms searched by your peers.

Explore the Dictionary

Related Assets

October 01, 2018

5 Steps to a Successful IAM Deployment

Learn how to deploy a successful IAM solution with this interactive five step guide.

See Details

November 06, 2019

IDM Assessment Service Brief

Optiv’s IDM Assessment offerings align programs and deployments with business goals and best practices.

See Details

Optiv Leadership Perspective – IDM as a Foundation for Security and Business Enablement

Bryan Wiese, Optiv’s Division Vice President and General Manager of Global Advisory Services discusses the importance of identity and data management ...

See Details

How Can We Help?

Let us know what you need, and we will have an Optiv professional contact you shortly.

Privacy Policy

Stay in the Know

For all the latest cybersecurity and Optiv news, subscribe to our blog and connect with us on Social.


Join our Email List

We take your privacy seriously and promise never to share your email with anyone.

Stay Connected

Find cybersecurity Events in your area.