Identity Governance and Administration

Identity governance and administration (IGA) is a cybersecurity framework for managing digital identities, access rights, and policy enforcement. It helps organizations grant the right access, review it regularly, and reduce identity-related risk.

Why identity governance and administration matters

Identity governance and administration is critical because access decisions can quickly become security risks when they’re not reviewed, documented, and adjusted over time. A user may start with appropriate access, but role changes, temporary projects, third-party work, and missed offboarding steps can leave permissions in place long after they are needed.

IGA gives organizations a structured way to answer three important questions: Who has access, why do they have it, and should they still have it?

Without that structure, security and IT teams can lose visibility into the access that connects users, applications, data, and cloud resources. The result is often privilege creep, stale accounts, and audit gaps that make identity-related risk harder to manage. IGA helps reduce that risk by supporting:

  • Least privilege access: Users receive only the access they need for their role or task, supported by least privilege access (LPA) principles.
  • Cleaner identity lifecycle processes: Access changes follow defined approval, provisioning, review, and removal steps.
  • Stronger audit readiness: Access decisions, approvals, and certifications are easier to document.
  • Lower operational friction: IT and security teams can standardize repeatable access workflows instead of handling every request manually.
  • Better risk visibility: Security teams can identify excessive, outdated, or unusual access before it becomes a larger problem.

How identity governance and administration works

IGA works by connecting identity administration tasks with governance controls. Administration covers actions such as creating accounts, granting access, changing permissions, and removing access. Governance adds the policies, reviews, approvals, and audit trails that make those actions accountable.

In practice, IGA follows the identity lifecycle from the moment someone joins an organization or needs access to a system through the point where that access is changed or removed.

Identity creation and access request

The process usually starts when a new employee, contractor, service account, or partner identity is created. That identity may need access to applications, shared data, cloud services, or business systems.

IGA helps route access requests through defined workflows. Instead of granting access informally, the request can be checked against role, department, location, risk level, and business need.

Approval, provisioning, and policy checks

Once a request is submitted, IGA can send it to the right approver and compare it with access policies. For example, a finance user may need access to one system but should not be allowed to approve their own payments or bypass separation-of-duties controls.

After approval, provisioning grants the requested access, which may be based on role-based access control (RBAC), attribute-based access control (ABAC), or another access model.

Review, adjustment, and deprovisioning

Access should not stay unchanged forever. IGA supports periodic access reviews, also called access certifications, where managers or system owners confirm whether users still need specific permissions.

When someone changes roles, finishes a project, or leaves the organization, IGA helps adjust or remove access. That deprovisioning step is especially important because stale accounts and unused permissions can create openings for attackers.

Key components of IGA

IGA is not one control, rather a set of connected processes that manage identities and access over time. The exact setup varies by organization, but most IGA programs include a few common components.

Identity lifecycle management

Identity lifecycle management covers the creation, maintenance, and removal of digital identities. It includes onboarding, role changes, transfers, temporary access, and offboarding.

The goal is to keep identity records and access rights aligned with the person’s current relationship to the organization. That relationship may be full-time employee, contractor, partner, vendor, or service account owner.

Access governance

Access governance defines who can request, approve, review, and revoke access. It also defines what policies apply to different users, systems, and data types.

Good access governance helps prevent access from becoming a series of one-off exceptions. It gives teams a consistent way to evaluate whether a permission is appropriate.

Access reviews and certification

Access reviews confirm whether users still need the access they have. These reviews are often required for compliance, but they also support day-to-day security by identifying permissions that no longer match a user’s role.

A useful review process should make it clear who owns each access decision, what evidence supports it, and what happens when access should be removed.

Reporting and audit trails

Reporting and audit trails show when access was requested, who approved it, when it was reviewed, and when it changed. This matters for compliance and regulatory frameworks, but it also helps security teams investigate identity-related incidents and understand how access decisions were made.

Examples and use cases

IGA becomes easier to understand when you look at the access problems it helps solve. These use cases show how governance and administration work together across common identity scenarios.

New employee onboarding

A new employee joins the marketing team and needs access to email, collaboration tools, analytics platforms, and a project management system. IGA can map the employee’s role to a standard access package, route any exceptions for approval, and document why each permission was granted.

Contractor offboarding

A contractor finishes a six-month project. Without IGA, their accounts may remain active because no single team owns the offboarding step across every system.

With IGA, access can be tied to an end date, project owner, or contract status. When the relationship ends, access is removed or sent for review.

Quarterly access review

A business unit runs a quarterly access review for sensitive financial systems. Managers receive a list of users and permissions, then approve, reject, or escalate access based on current job responsibilities.

The review creates an audit trail and helps remove accumulated permissions that are no longer justified.

Cloud entitlement cleanup

A developer receives temporary cloud permissions to troubleshoot a deployment issue. Those permissions are useful for a short period but risky if they stay in place.

IGA can help identify and remove excessive access, while cloud infrastructure entitlement management (CIEM) provides deeper visibility into cloud-specific permissions and entitlement sprawl.

How IGA fits into security operations

IGA supports security operations by reducing identity-related uncertainty. When analysts investigate suspicious activity, they need to know whether an account’s access is normal, excessive, recently changed, or no longer valid.

IGA is closely related to identity and access management (IAM), but the two are not the same. IAM focuses broadly on authenticating users and controlling access. IGA focuses on governing that access over time through policy, review, approval, and auditability.

IGA also overlaps with privileged access management. PAM protects high-risk privileged accounts and sessions, while IGA helps govern who should have privileged access in the first place, how that access is approved, and whether it remains appropriate.

For detection and response teams, IGA adds context. If an account triggers an alert, security teams can compare the activity against the account’s approved access, role, recent changes, and certification history. That context can improve investigations and support identity threat detection and response.

IGA also supports zero trust security by reinforcing continuous verification and access minimization. Instead of assuming access remains valid indefinitely, IGA creates regular checkpoints for reviewing and adjusting permissions.

Frequently asked questions