{"id":30347,"date":"2024-04-02T14:19:45","date_gmt":"2024-04-02T13:19:45","guid":{"rendered":"https:\/\/ductus.global\/?p=30347"},"modified":"2025-07-04T09:38:24","modified_gmt":"2025-07-04T08:38:24","slug":"maintenance-the-vital-defense-longtail-of-any-iam-solution","status":"publish","type":"post","link":"https:\/\/ductus.global\/sv\/maintenance-the-vital-defense-longtail-of-any-iam-solution\/","title":{"rendered":"Maintenance \u2013 the vital defense longtail of any IAM solution"},"content":{"rendered":"\n<div class=\"wp-block-cover alignfull\" style=\"min-height:300px;aspect-ratio:unset;\"><span aria-hidden=\"true\" class=\"wp-block-cover__background has-d-plum-dark-background-color has-background-dim-60 has-background-dim\"><\/span><img decoding=\"async\" width=\"1200\" height=\"675\" src=\"https:\/\/ductus.global\/wp-content\/uploads\/2024\/03\/iam.jpg\" class=\"wp-block-cover__image-background wp-post-image\" alt=\"\" data-object-fit=\"cover\" data-object-position=\"38% 62%\" style=\"object-position:38% 62%;\" srcset=\"https:\/\/ductus.global\/wp-content\/uploads\/2024\/03\/iam.jpg 1200w, https:\/\/ductus.global\/wp-content\/uploads\/2024\/03\/iam-300x169.jpg 300w, https:\/\/ductus.global\/wp-content\/uploads\/2024\/03\/iam-768x432.jpg 768w, https:\/\/ductus.global\/wp-content\/uploads\/2024\/03\/iam-1024x576.jpg 1024w, https:\/\/ductus.global\/wp-content\/uploads\/2024\/03\/iam-89x50.jpg 89w, https:\/\/ductus.global\/wp-content\/uploads\/2024\/03\/iam-784x441.jpg 784w\" sizes=\"(max-width: 1200px) 100vw, 1200px\" \/><div class=\"wp-block-cover__inner-container is-layout-constrained wp-block-cover-is-layout-constrained\">\n<p class=\"has-text-align-center\" style=\"font-size:20px\">ARTICLE<\/p>\n\n\n\n<h1 class=\"wp-block-heading has-text-align-center has-ductus-white-color has-text-color has-link-color wp-elements-174f48b1008d73a17e4051e6436ba9cd\" style=\"font-size:42px;font-style:normal;font-weight:600\">Maintenance \u2013 the vital defense longtail of any IAM solution<\/h1>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-group alignfull\"><div class=\"wp-block-group__inner-container is-layout-flow wp-block-group-is-layout-flow\">\n<div style=\"height:100px\" aria-hidden=\"true\" class=\"wp-block-spacer is-style-responsive-small\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-increasing-iam-complexity\">Increasing IAM complexity<\/h3>\n\n\n\n<p>The need for effective Identity Access Management (IAM) has never been greater, whether for humans trying to log in via a frontend client or machine-to-machine identities. And, with such a broad spectrum of gateways, APIs, SOAP interfaces, direct point-to-point integrations, or other transfer protocols, the challenge of authenticating identities and authorizing access is increasingly complex.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-cloud-and-the-hybrid-workplace\">Cloud and the hybrid workplace<\/h3>\n\n\n\n<p>On top of this new developments and trends in IT add additional challenges, such as the migration to the cloud that many organizations have undertaken, some fully, while many have a hybrid architecture of apps, services, and servers. Another major challenge is catering for the new hybrid work policies at many organizations following the pandemic. Where users previously came to work, logged into the company network, and accessed systems, services and programs in a gated environment, working from home adds considerable complexity, particularly when staff access sensitive data. The opening up of organizations in this way has led to a significant rise in the use of APIs.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-fortifying-the-organization-with-iam\">Fortifying the organization with IAM<\/h3>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"alignright size-full is-resized\"><img decoding=\"async\" width=\"700\" height=\"521\" src=\"https:\/\/ductus.global\/wp-content\/uploads\/2020\/10\/security-dev.png\" alt=\"\" class=\"wp-image-9392\" style=\"width:300px\" srcset=\"https:\/\/ductus.global\/wp-content\/uploads\/2020\/10\/security-dev.png 700w, https:\/\/ductus.global\/wp-content\/uploads\/2020\/10\/security-dev-300x223.png 300w, https:\/\/ductus.global\/wp-content\/uploads\/2020\/10\/security-dev-67x50.png 67w, https:\/\/ductus.global\/wp-content\/uploads\/2020\/10\/security-dev-593x441.png 593w\" sizes=\"(max-width: 700px) 100vw, 700px\" \/><\/figure>\n<\/div>\n\n\n<p>One such tool to facilitate this is the Curity Identity Server, for which Ductus is an official service partner. Typically, <a href=\"https:\/\/ductus.global\/secure-your-digital-services\/#identify\" target=\"_blank\" rel=\"noreferrer noopener\">we help customers<\/a> deploy the solution, configure the identity server and authentication flows, and maintain the system \u2013 a critical requirement in the fortification of an organization, but something that can be easily underestimated or troublesome to manage inhouse.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-solution-deployment\">Solution deployment<\/h3>\n\n\n\n<p>Not surprisingly, much focus is put into deploying a solution and configuring the setup. This includes everything the deployment of the Identity Server through to securing firewall endpoints, defining load balancer requirements, and connecting servers containing certificates and databases housing identity tokens. Standard cybersecurity procedures, including penetration testing and common exposure (CVE) classification and scoring, are also a key part of the process. All this must be done, and stress tested multiple times prior to launch. Obviously, depending on the industry, the level of complexity differs. A bank requires configuration to external authentication services such as BankID. In contrast, the level of certificate-based external communication between servers (and indeed regulatory requirements) will be far lower in an organization with only its staff accessing information.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-maintenance-key-to-a-strong-defense\">Maintenance \u2013 key to a strong defense<\/h3>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"alignright size-full is-resized\"><img decoding=\"async\" width=\"637\" height=\"491\" src=\"https:\/\/ductus.global\/wp-content\/uploads\/2024\/03\/identification-2.png\" alt=\"\" class=\"wp-image-30355\" style=\"width:300px\" srcset=\"https:\/\/ductus.global\/wp-content\/uploads\/2024\/03\/identification-2.png 637w, https:\/\/ductus.global\/wp-content\/uploads\/2024\/03\/identification-2-300x231.png 300w, https:\/\/ductus.global\/wp-content\/uploads\/2024\/03\/identification-2-65x50.png 65w, https:\/\/ductus.global\/wp-content\/uploads\/2024\/03\/identification-2-572x441.png 572w\" sizes=\"(max-width: 637px) 100vw, 637px\" \/><\/figure>\n<\/div>\n\n\n<p>As skilled a job as it is to deploy and configure an IAM solution, maintaining and monitoring it requires an equal skillset, even if it\u2019s not as time-consuming. It typically involves upgrading the security platform and the different IAM and cybersecurity components, including the gateway and load balancer. Databases must also be cleaned up, maintained, and upgraded. Monitoring the system is vital. For instance, a burst of failed authentications can signify an attempted hacking attack or some other services like an external Bank identity server being down \u2013 which end customers must be informed about.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-maintenance-skillsets\">Maintenance skillsets<\/h3>\n\n\n\n<p>To manage the maintenance of an IAM system such as the Curity Identity Server, you have to know and work with OAuth and OpenID Connect. You may need to ensure regulatory frameworks such as PSD2 are met. You have to understand how to set up a server and network and be able to manage Java-based security products running on Linux servers. It\u2019s a niche role, but not a full-time one, which can make it difficult to find and retain people with those skill sets \u2013 a risk many organizations don\u2019t want to take.<\/p>\n<\/div><\/div>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-why-outsourcing-works\">Why outsourcing works<\/h3>\n\n\n\n<p>Outsourcing maintenance removes the headache of finding and keeping people with the required talents or relying on one person to handle the maintenance when they have other responsibilities to focus on. You also get experts with IAM experience from different industries, where they can apply best practices to your solution. Additionally, you can be assured the experts keep up with the latest regulations, releases, and trends in the field \u2013 sharing them with your IT security team.<\/p>\n\n\n\n<p>If IAM maintenance is falling down the priority list for your IT security team, you could be lowering your defenses. Outsourcing it today will ensure it\u2019s prioritized tomorrow and every day moving forward. We have clients throughout Sweden and across the globe who outsource their IAM maintenance with Ductus. Let\u2019s discuss how we can help you.<\/p>\n\n\n\n<div style=\"height:100px\" aria-hidden=\"true\" class=\"wp-block-spacer is-style-responsive-small\"><\/div>\n\n\n\n<div class=\"wp-block-group alignfull\" id=\"contact-us\"><div class=\"wp-block-group__inner-container is-layout-flow wp-block-group-is-layout-flow\">\n<hr class=\"wp-block-separator has-text-color has-d-mocha-mid-color has-alpha-channel-opacity has-d-mocha-mid-background-color has-background\"\/>\n\n\n\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer is-style-responsive-smaller\"><\/div>\n\n\n\n<div class=\"wp-block-columns are-vertically-aligned-center is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\"><div class=\"wp-block-image is-style-rounded\">\n<figure class=\"alignright size-full is-resized\"><img decoding=\"async\" width=\"340\" height=\"340\" src=\"https:\/\/ductus.global\/wp-content\/uploads\/2023\/08\/Anders-Essner.jpg\" alt=\"\" class=\"wp-image-28264\" style=\"width:170px;height:170px\" srcset=\"https:\/\/ductus.global\/wp-content\/uploads\/2023\/08\/Anders-Essner.jpg 340w, https:\/\/ductus.global\/wp-content\/uploads\/2023\/08\/Anders-Essner-300x300.jpg 300w, https:\/\/ductus.global\/wp-content\/uploads\/2023\/08\/Anders-Essner-150x150.jpg 150w, https:\/\/ductus.global\/wp-content\/uploads\/2023\/08\/Anders-Essner-50x50.jpg 50w\" sizes=\"(max-width: 340px) 100vw, 340px\" \/><\/figure>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\">\n<h3 class=\"wp-block-heading\" id=\"h-anders-essner\">Anders Essner<\/h3>\n\n\n\n<p>Phone: +46 (70) 513 56 19<br>anders.essner(at)ductus.se<\/p>\n<\/div>\n<\/div>\n\n\n\n<div style=\"height:100px\" aria-hidden=\"true\" class=\"wp-block-spacer is-style-responsive-small\"><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-cover alignfull is-light\"><img decoding=\"async\" width=\"1920\" height=\"1280\" class=\"wp-block-cover__image-background wp-image-30289\" alt=\"\" src=\"https:\/\/ductus.global\/wp-content\/uploads\/2020\/10\/Identity.jpeg\" data-object-fit=\"cover\" srcset=\"https:\/\/ductus.global\/wp-content\/uploads\/2020\/10\/Identity.jpeg 1920w, https:\/\/ductus.global\/wp-content\/uploads\/2020\/10\/Identity-300x200.jpeg 300w, https:\/\/ductus.global\/wp-content\/uploads\/2020\/10\/Identity-768x512.jpeg 768w, https:\/\/ductus.global\/wp-content\/uploads\/2020\/10\/Identity-1024x683.jpeg 1024w, https:\/\/ductus.global\/wp-content\/uploads\/2020\/10\/Identity-1536x1024.jpeg 1536w, https:\/\/ductus.global\/wp-content\/uploads\/2020\/10\/Identity-75x50.jpeg 75w, https:\/\/ductus.global\/wp-content\/uploads\/2020\/10\/Identity-662x441.jpeg 662w\" sizes=\"(max-width: 1920px) 100vw, 1920px\" \/><span aria-hidden=\"true\" class=\"wp-block-cover__background has-ductus-brightblue-background-color has-background-dim-40 has-background-dim\"><\/span><div class=\"wp-block-cover__inner-container is-layout-constrained wp-block-cover-is-layout-constrained\">\n<div style=\"height:100px\" aria-hidden=\"true\" class=\"wp-block-spacer is-style-responsive-small\"><\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:66.66%\">\n<h2 class=\"wp-block-heading has-ductus-white-color has-text-color has-link-color wp-elements-8a25e065a3bce77c1aef66650de62830\" id=\"h-identity-as-a-service-brings-automation-to-digital-bank-s-secure-authentication-service\"><strong>Identity as a Service brings automation to digital bank\u2019s secure authentication service<\/strong><\/h2>\n\n\n<div class=\"cta-button wp-block-button ductus-cta-block alignleft\">\n\t\t\t<a href=\"https:\/\/ductus.global\/cases\/identity-as-a-service-brings-automated-processes-and-deployments-to-digital-banks-secure-authentication-service\/\" title=\"Identity as a Service brings automation to digital bank\u2019s secure authentication service\" \t\t\t\tclass=\"ductus-btn-angle has-ductus-green-background-color md\"\n\t\t\t\tdata-gtmtrack=\"true\" data-trackelement=\"call-to-action\"\n\t\t\t\tdata-trackvalue=\" Read the case study\"> Read the case study<\/a>\n\t\t<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:33.33%\"><\/div>\n<\/div>\n<\/div><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Increasing IAM complexity The need for effective Identity Access Management (IAM) has never been greater, whether for humans trying to log in via a frontend client or machine-to-machine identities. And, with such a broad spectrum of gateways, APIs, SOAP interfaces, direct point-to-point integrations, or other transfer protocols, the challenge of authenticating identities and authorizing access [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":30352,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[3787,4214],"tags":[4248],"class_list":["post-30347","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-articles","category-articles-it-consulting","tag-infrastructure-security"],"acf":[],"_links":{"self":[{"href":"https:\/\/ductus.global\/sv\/wp-json\/wp\/v2\/posts\/30347","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ductus.global\/sv\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ductus.global\/sv\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ductus.global\/sv\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/ductus.global\/sv\/wp-json\/wp\/v2\/comments?post=30347"}],"version-history":[{"count":7,"href":"https:\/\/ductus.global\/sv\/wp-json\/wp\/v2\/posts\/30347\/revisions"}],"predecessor-version":[{"id":33648,"href":"https:\/\/ductus.global\/sv\/wp-json\/wp\/v2\/posts\/30347\/revisions\/33648"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ductus.global\/sv\/wp-json\/wp\/v2\/media\/30352"}],"wp:attachment":[{"href":"https:\/\/ductus.global\/sv\/wp-json\/wp\/v2\/media?parent=30347"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ductus.global\/sv\/wp-json\/wp\/v2\/categories?post=30347"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ductus.global\/sv\/wp-json\/wp\/v2\/tags?post=30347"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}