Managing identities and access is a key element of this security strategy. ‘Identity’ itself is a broad term, and can represent people, services, or IoT devices. From an IT security perspective, when a particular identity tries to access something, it has to pass through a strict, pre-prepared verification process with strong authentication, which checks that it is legal, compliant and behaving in a typical, expected way. This sounds logical enough – but it’s surprising how many organisations do not have it sufficiently in place.