Why Identity Governance Matters More Than Ever

4 min read
identity-governanceiamsailpointzero-trustcompliance

The Identity Problem No One Talks About

Every breach postmortem tells the same story: it started with access. A dormant account that should have been deprovisioned. An entitlement that outlived a role change. A service account with admin rights that nobody remembered existed.

Identity governance isn't glamorous. It doesn't get keynote slots or viral tweets. But when it fails, everything else fails with it.

After 10+ years of building identity governance programs across federal banking, financial services, aerospace, and healthcare, I've seen the same patterns repeat. Organizations invest heavily in perimeter security while leaving their identity infrastructure held together with spreadsheets, manual reviews, and hope.


What's Changed in the Last Three Years

The identity landscape has shifted dramatically:

Hybrid complexity has exploded. Organizations now manage identities across on-prem Active Directory forests, Azure AD (now Microsoft Entra ID), GovCloud workloads, SaaS platforms, and legacy systems simultaneously. A single identity might have accounts across 15+ systems.

Regulatory pressure keeps increasing. SOX, NIST 800-53, HIPAA, PCI-DSS, ISO 27001 — compliance frameworks are getting more prescriptive about access controls. Auditors don't just want policies; they want proof of automated enforcement.

Zero Trust demands identity as the control plane. When the network perimeter dissolves, identity becomes the only consistent enforcement point. Every access decision routes back to "who is this person, and what should they be able to do right now?"


The Engineering Approach to Identity

The most resilient identity programs I've built share common characteristics:

1. HR-Driven Lifecycle Automation

The identity lifecycle — Joiner, Mover, Leaver — must be triggered by authoritative HR events, not manual tickets. When someone joins the organization, changes roles, or leaves, their access should adjust automatically. This means:

  • Pre-provisioning validation to catch data quality issues before accounts are created
  • Post-provisioning reconciliation to verify downstream systems actually applied the changes
  • Retry and rollback flows to handle downstream system outages gracefully

2. Correlation That Actually Works

Getting identity correlation right across heterogeneous systems is harder than most people realize. When you're aggregating from AD, CyberArk, Oracle Financials, and SAP in the same environment, you need:

  • Schema normalization strategies that handle inconsistent attribute formats
  • Tuned correlation rules that minimize false positives without creating orphaned accounts
  • Delta aggregation optimization to avoid hammering source systems with full aggregations

3. Certification Campaigns That Catch Real Risk

Access certifications are only valuable if they surface meaningful decisions. A campaign that asks a manager to review 500 entitlements in a single session will get rubber-stamped. Effective certification architecture requires:

  • Risk-based scoping that prioritizes high-risk applications
  • Custom escalation workflows for overdue reviews
  • SoD violation detection integrated into the review process
  • Revocation logic that actually executes when access is denied

The Connector Problem

One of the biggest challenges in enterprise IAM is connecting SailPoint to systems that don't support standard protocols. OOTB connectors work for mainstream platforms, but regulated industries always have proprietary systems that require custom integration.

I've built custom connectors using Connector Studio, direct REST APIs, JDBC connections, and SCIM implementations for systems ranging from defense engineering tools (Teamcenter, ClearCase) to financial platforms (Oracle E-Business Suite, SAP Treasury). Each one requires understanding both the identity platform and the target system deeply enough to handle edge cases — encrypted attributes, non-standard schemas, pagination for large result sets, and API rate limiting.


What I'm Watching

A few trends I think will shape identity governance in the next 2–3 years:

  1. AI-assisted access reviews — Using behavioral analytics to recommend certification decisions rather than dumping raw entitlement lists on reviewers.
  2. Identity fabric architectures — Moving beyond hub-and-spoke IGA to distributed identity decision-making.
  3. Continuous access evaluation — Shifting from periodic certification to real-time access validation based on context and risk signals.

The organizations that treat identity governance as an engineering discipline — not an IT admin task — will be the ones that scale securely.


This is my first post on this site. I plan to write more about practical IAM engineering, SailPoint implementation patterns, and lessons from building identity programs at scale. Stay tuned.