Let's walk through how identity security works for a fictional employee named Chris. She may not realize it, but digital identity security best practices are working to protect her in nearly every aspect of her life — both personally and professionally.
Employee Onboarding and Access
Chris has just been hired at ACME Company. As she enters the onboarding process, a user account is automatically created for her. It includes identity verification as well as rights and permissions. The system uses user provisioning to determine appropriate access for Chris based on her role and department.
Access Request
Part of switching to a new job involves getting new health insurance. Chris needs to update her medical provider to an in-network doctor. She logs onto her new provider's website to register an account and manage her privacy settings. Because healthcare organizations have strict compliance regulations, Chris is required to log on using multi-factor authentication, which includes her password as well as a one-time code via text.
Sharing Health Information
Chris regularly accesses her health dashboard in the months ahead. She logs on to schedule appointments, view bills, and get lab results faster. She can even chat with her healthcare provider and feel confident that her data is kept private and secure with additional authentication steps when she wants to review sensitive health data.
Making a Purchase Online
After her first few months at her new job, Chris has saved up some money and is ready to purchase a new wide-screen TV. She opens her favorite retail app and is already signed in. She adds the television to her shopping cart and checks out with a few taps. Chris doesn't realize it, but the retail app has assessed her activity and decided she does not need to re-authenticate her session. The reason? The retail app's backend is constantly assessing risk signals, which are low in this scenario – she’s using a trusted device, logging in from a familiar location, and behaving normally. As a result, Chris enjoys a secure, frictionless checkout experience.
Enabling Remote Work Access
Back at work, Chris has been onboarded into the organization's systems according to her role. But in addition to logging on at the office, Chris also works from home two days a week. Despite being offsite, an adaptive authentication authority intakes all the risk signals Chris shows when attempting to log in in the morning and makes a decision in line with policy as to whether she is, in fact, who she says she is.
Identity security enables better talent acquisition for this reason, keeping remote work secure.
Role Changes and Access Review
Chris has been working hard and six months later gets a promotion! Her new responsibilities come with additional access requirements.
The group known as JML (joiners, movers, and leavers) are a core feature of modern identity lifecycle management, which removes access from Chris's initial role, and grants access to the resources she needs in her new role.
As part of this, managers need the ability to review the set of credentials and apps their employees have access to. This ensures that as roles change, managers (and other approvers if needed) can review all the access their employees have so no unnecessary access is granted. This upholds the principle of least privilege.
Applying for a Loan
The new job is going great, and Chris wants to take out a loan for a new car. She logs into her preferred bank's website and completes biometric multi-factor authentication. She applies for the loan digitally, and completes a quick and easy digital identity verification at loan origination.
A New Opportunity
After a year in the new job, Chris gets an amazing new job offer with a different company. Once her final day at ACME Company is complete, access to the internal systems is revoked. The offboarding process is absolutely critical from an employee experience perspective and organizational risk perspective.
Once someone leaves (whether they're fired or quit), they need to be fully deprovisioned to ensure no set of credentials exist to be exploited. This also ensures that potentially disgruntled employees can't become an insider threat before they leave.