IT Central Station is now PeerSpot: Here's why

What is the difference between IDAM , PIM and PAM?

Hi all,

Can anyone help me out to understand what's the difference between the IDAM, PIM and PAM terms?

I've tried to check them out on the Web but unfortunately, was unable to understand the core concept.

I appreciate the help!

PeerSpot user
25 Answers

Shibu Babuchandran - PeerSpot reviewer
ExpertModeratorReal User

Hi @reviewer1740369,

This is something that I have been doing research for some time now, the question came at the right time. 

The data that I could frame out is as below. I hope this helps you in some way. I'm also trying to prepare an article on the same topic shortly.

Privileged Identity Management (PIM) is a capability within identity management focused on the special requirements of managing highly privileged access. PIM is an information security and governance tool to help companies meet compliance regulations and to prevent system and data breaches through the improper use of privileged accounts.” Privileged access management (PAM) is the combination of tools and technology used to secure, control and monitor access to an organization’s critical information and resources. Subcategories of PAM include shared access password management, privileged session management, vendor privileged access management and application access management.” “Identity and access management (IAM) is the discipline that enables the right individuals to access the right resources at the right times for the right reasons.”
Points to follow to implement Privileged Identity Management in organization Identify and keep track of all superuser accounts. Provisioning and deprovisioning procedures Clearly Define IAM Vision
Define how superuser accounts will be managed and what their corresponding users can and can’t do. Approval and dismissal of privileged access requests Develop A Strong Foundation
Set up procedures and deploy tools for superuser account management Password categorization Stage-wise Implementation
Password composition, such as length and complexity Stakeholder Awareness
Acceptable use for privileged accounts Consider Identity as Primary Security Perimeter
Enforce Multi-Factor Authentication
Establish Single Sign-On
Implement Zero-Trust Policy
Enforce a Strong Password Policy
Secure Privileged Accounts
Conduct Regular Access Audits
Implement Passwordless Login

Shibu Babuchandran - PeerSpot reviewerShibu Babuchandran
ExpertModeratorReal User

@reviewer1740369 ,
Thanks for your response.

Bruce Macdonald - PeerSpot reviewer

IDAM stands for Identity and Access Management. Think of this as the lifecycle of user accounts and privileges. When a person joins a company they get accounts provisioned to them, group memberships added to those accounts, etc. They may go through a name change, leave of absence, termination and so on. Users need to be authenticated into their applications and once authenticated, they need to be authorized to access certain things. All of these are the responsibility of the IDAM system. IDAM is commonly referred to as simply IAM (Identity and Access Management).

Privileged Identity Management (PIM) and Privileged Access Management (PAM) are very similar. They provide controlled, time based disclosure to privileged and/or very sensitive credentials. PIM is an information security and governance tool to help companies meet compliance regulations and to prevent system and data breaches through the improper use of privileged accounts.

Privileged Access Management (PAM) provides the tools that enable organizations to manage such privileged access and approvals for users - both human and non-human. PAM lets companies minimize their attack surface by granting a certain level of privileged access to a user and no more and only for as long as they need it.

The differences between PAM and PIM are subtle for sure.

reviewer1740369 - PeerSpot reviewerreviewer1740369 (User at Jkumar infra)

@Bruce Macdonald Thank you sir for assistance.

Buyer's Guide
Identity Management (IM)
May 2022
Find out what your peers are saying about SailPoint, One Identity, Omada and others in Identity Management (IM). Updated: May 2022.
599,220 professionals have used our research since 2012.