← Back to portfolio

IAM Control Mapping

Status

Complete

Maturity

12 controls mapped to risks and governance themes

Evidence

Full mapping documented below

Next

Add control testing evidence

Introduction

This mapping connects 12 core IAM controls to the risks they address, the governance frameworks that require or recommend them, and the implementation patterns that make them operational. IAM engineering decisions are not made in isolation — they exist within a risk management and compliance context.

Frameworks referenced: NIST SP 800-53, CIS Controls v8, ISO/IEC 27001:2022, SOC 2 (AICPA Trust Services Criteria), and SOX IT General Controls.

Control Mapping

#ControlRisk AddressedFrameworksImplementation
1Privileged Access ManagementPrivileged account compromiseNIST AC-6, CIS Control 5, SOXPAM tooling, credential vaulting, session recording, JIT elevation
2Multi-Factor AuthenticationCredential stuffing, phishingNIST IA-2, ISO 27001 A.9.4.2, SOC 2 CC6.1TOTP, FIDO2/WebAuthn, push notifications; risk-based step-up
3Least Privilege AccessExcessive blast radius on compromiseNIST AC-6, CIS Control 6Role mining, access reviews, entitlement management tooling
4Role-Based Access ControlInconsistent access model across systemsNIST AC-2, SOC 2 CC6.1, SOXRole hierarchy design, SCIM group sync, SoD constraints enforced
5Identity Lifecycle ManagementOrphaned accounts, stale accessNIST AC-2, GDPR Art.17, SOC 2 CC6.2Joiner/Mover/Leaver process, SCIM provisioning and deprovisioning
6Automated Provisioning (SCIM)Manual provisioning errors, orphaned accountsNIST AC-2, SOC 2 CC6.1SCIM v2 connector platform, automated sync with IdP on user events
7Just-in-Time Access ElevationStanding privileged accessNIST AC-2(5), CIS Control 5Time-boxed elevation requests, approval workflows, auto-expiry
8Periodic Access CertificationAccess creep, SoD violationsSOX 404, SOC 2 CC6.2, ISO 27001 A.9.2.5Quarterly review campaigns, certifier routing, automated revocation on non-response
9Separation of DutiesFraud, unauthorised transactionsSOX, COBIT, SOC 2 CC6.3SoD matrix definition, conflict detection at provisioning, compensating controls
10Non-Human Identity GovernanceOver-privileged service accounts, credential exposureNIST IA-2, CIS Control 4, SOC 2 CC6.1OAuth2 client credentials, scope governance, rotation automation, NHI inventory
11SSO and Federated AuthenticationAuthentication inconsistency, shadow ITNIST IA-8, SOC 2 CC6.1, ISO 27001 A.9.4.4SAML/OIDC federation, IdP-initiated and SP-initiated flows, MFA enforcement at IdP
12Audit Logging and MonitoringUndetected access events, compliance gapsNIST AU-2, SOC 2 CC7.2, ISO 27001 A.12.4Structured JSON audit events, SIEM integration, alert thresholds, retention policy

Risk Themes

Credential and Authentication Risk

Controls: #1, #2, #10, #11

Controls that reduce the likelihood of credential compromise and authentication bypass

Access Creep and Excessive Privilege

Controls: #3, #4, #7, #8, #9

Controls that prevent and detect accumulation of unneeded access over time

Identity Lifecycle and Orphan Risk

Controls: #5, #6

Controls that ensure access is provisioned and deprovisioned in line with employment and role changes

Audit and Governance

Controls: #12

Controls that ensure access decisions and events are logged, attributable, and reviewable

Governance Framework Coverage

NIST SP 800-53

AC-2, AC-6, AU-2, IA-2, IA-8

Federal information system baseline; widely adopted in commercial enterprise

CIS Controls v8

Controls 4, 5, 6

Prescriptive implementation guidance for access management and account hygiene

ISO/IEC 27001:2022

A.9.2.5, A.9.4.2, A.9.4.4, A.12.4

International ISMS standard; required for ISO certification audits

SOC 2 (TSC)

CC6.1, CC6.2, CC6.3, CC7.2

Trust Services Criteria; required for service organisation reporting

SOX ITGC

Access controls, change management

IT General Controls for financial system integrity; mandatory for public companies

GDPR

Art. 17 (right to erasure)

Identity lifecycle: deprovisioning must include data deletion or anonymisation

Employer Value

Risk reduced

Uncontrolled access, credential exposure, audit blind spots

Operational value

Connects technical controls to governance requirements

IAM domain

Access governance, risk management, control frameworks

Seniority signal

Security thinking applied systematically — not ad hoc

Evidence

Control mapping table

[ Documented above — 12 controls ]

Risk theme analysis

[ Documented above ]

Control testing evidence

[ Pending — next milestone ]

Framework crosswalk

[ Documented above ]