Logical Access Requests Belong in IAM not ITSM

May 2, 2023

IAM is focused on managing user identities and their access to resources within the organization. It includes managing user authentication, authorization, and access control, and ensuring that users have the appropriate level of access to perform their job responsibilities. ITSM, on the other hand, is focused on managing the delivery of IT services to users, including incident management, physical access, problem management, and service request management.

Access requests, or requests for access to resources within the organization, are an essential component of IAM. Access requests typically involve requests for access to specific applications, systems, or data that are required to perform job responsibilities. These requests may be initiated by users, managers, or other stakeholders within the organization.

There are several reasons why access requests belong in IAM rather than ITSM. First and foremost, IAM is designed to manage user identities and access to resources. Access requests are a fundamental aspect of identity and access management, as they involve granting or revoking access to specific resources based on the user's identity and role within the organization.

Second, IAM provides a comprehensive view of user access across the organization. This enables IAM teams to monitor access levels, identify potential security risks, and ensure that users have the appropriate level of access to perform their job responsibilities. ITSM, on the other hand, is focused on managing service requests, incidents, and problems related to the delivery of IT services. While ITSM may involve access requests, it does not provide the same level of visibility into user access, policies, approval workflows and automated provisioning/de-provisioning as IAM.

Third, IAM provides a centralized platform for managing access requests. IAM is designed to handle the request, approval and fulfillment steps with security and compliance in mind.  The request process in IAM is designed to only show entitlements and resources users are allowed to request based on title, job function, location and/or attributes. This enables IAM teams to streamline the access request process, reduce the time required to fulfill requests, and ensure that access is granted or revoked in a timely and consistent manner. ITSM, on the other hand, may involve multiple teams and processes, which can lead to delays and inconsistencies in the access request process.

Fourth, IAM provides a framework for enforcing access policies and ensuring compliance with regulatory requirements. Access requests are an essential aspect of ensuring that users have the appropriate level of access to perform their job responsibilities while maintaining security and compliance. IAM provides a comprehensive set of tools and processes for managing access requests and enforcing access policies, which is critical in today's complex and dynamic IT environment.

Finally, IAM provides a platform for integrating with other IT systems and applications. Access requests may involve multiple IT systems and applications, such as HR systems, directory services, and provisioning systems. IAM provides a centralized platform for integrating these systems and applications and ensuring that access requests are processed in a consistent and secure manner.

Access requests belong in IAM rather than ITSM due to the unique focus and capabilities of IAM in managing user identities and access to resources. IAM provides a comprehensive view of user access, a centralized platform for managing access requests, a framework for enforcing access policies and ensuring compliance, and a platform for integrating with other IT systems and applications. By managing access requests within IAM, organizations can improve the efficiency and effectiveness of the access request process, reduce the risk of security breaches, and ensure compliance with regulatory requirements.

Download this blogBack to blog

Mohammed Elkhatib

Founder and CEO

Mohammed is an Identity Management and Access Governance thought leader with over 16 years of Information Security experience and over 20 years of IT and Business experience. Mohammed has worked with over 500 Identity Management and Access Governance clients. Mohammed’s significant and numerous contributions at the most successful Identity and Access related startups have led to three successful exits in excess of $825MM.

View Linkedin