Why Identity and Access Management Is the New Perimeter for Ottawa Businesses
In 2025 identity has replaced the network as the primary attack surface. IBM’s 2025 Cost of a Data Breach report states that credential-based attacks now account for 19 % of all breaches and carry the highest average cost at $4.92 million globally and $6.24 million in Canada. For Ottawa organizations operating under PIPEDA, ITSG-33, GC CSE directives, or Protected-B handling requirements, weak identity controls trigger audit findings, contract disqualifications, and potential loss of authority to operate.
The perimeter dissolved years ago. Users authenticate from unmanaged devices over consumer ISPs, applications run in Microsoft Azure Government Community Cloud, AWS GovCloud equivalents, or Canadian-hosted private clouds, and service principals execute headless workloads in Kubernetes clusters. Traditional network firewalls and VPN concentrators can no longer enforce policy at the granularity required. Modern Identity and Access Management (IAM) has therefore become the new control plane.
The Modern Identity Fabric – Technical Architecture Overview
Contemporary IAM deployments are built as an identity fabric composed of multiple synchronized directories and policy engines
- Microsoft Entra ID (formerly Azure AD) as the cloud identity provider
- On-premises Active Directory synchronized via Entra Connect with pass-through authentication or federation via ADFS/ADFS 2019
- Third-party SaaS applications integrated via SCIM 2.0 provisioning and OIDC/SAML 2.0 federation
- Non-human identities managed through HashiCorp Vault, CyberArk Conjur, or native cloud workload identity services (AWS IAM Roles for Service Accounts, GCP Workload Identity Federation, Azure Managed Identities)
The policy decision point is typically Entra ID Conditional Access combined with a Cloud Access Security Broker (Microsoft Defender for Cloud Apps or Zscaler Private Access) and a Privileged Access Management overlay (CyberArk, BeyondTrust, or Delinea Secret Server).
A list of real-time questions answered on every authentication request.
- Identity assurance – Is the token issued by a trusted IdP with phishing-resistant MFA (FIDO2 WebAuthn or CBA)?
- Device assurance – Does the device present a valid Intune or JAMF compliance attestation and TPM-bound key?
- Risk signal – Does Microsoft Entra ID Protection or CrowdStrike Identity Protection flag impossible travel, anonymous IP, or credential stuffing indicators?
- Contextual policy – Is the requested resource tagged Protected-B and the user lacking an active Government of Canada PKI certificate?
Explore Microsoft Entra ID Protection technical deep-dive
Phishing-Resistant Authentication Protocols and Implementations
Passwordless is now table stakes. Organizations achieving NIST AAL3 and IAL2 require one of the following items.
- FIDO2 WebAuthn with hardware-bound keys (YubiKey 5 Series, Google Titan, Feitian ePass) using ECDH-ES256 or RS256
- Platform passkeys synced via iCloud Keychain or Windows Hello for Business with device-bound private keys stored in the TPM 2.0
- Certificate-Based Authentication using S/MIME or client certificates issued from an enterprise PKI (Entrust Datacard, GlobalSign, or the Government of Canada Entrust PKI)
Configuration example for Entra ID Conditional Access requiring phishing-resistant MFA
Require authentication strength ? Phishing-resistant MFA
Exclude legacy protocols (POP3, IMAP, SMTP, ActiveSync)
Block all authentication attempts using NTLM or Kerberos with RC4 encryption.
Non-Human Identity Sprawl – The Hidden Attack Surface
Machine identities outnumber human identities 10:1 to 50:1 in mature environments. Common classes
- Workload identities – Kubernetes service accounts, GCP service accounts, Azure Managed Identities
- Application-to-application – OAuth 2.0 client credentials flow, mTLS client certificates
- DevOps secrets – CI/CD pipeline tokens, Terraform state access keys
- Database service accounts – SQL logins with sysadmin fixed role
Best-of-breed controls in 2025
- Automatic discovery via Venafi, HashiCorp Vault, or CyberArk Discovery
- Rotation every 7–30 days using just-in-time credential issuance
- Binding to short-lived X.509 certificates (1–4 hour TTL) instead of long-lived secrets
Read Ping Identity Machine Identity Security Report 2025
Zero Standing Privilege Technical Implementation
Permanent Domain Admins, Enterprise Admins, or Azure Global Administrator roles are extinct in mature environments. Modern patterns
Microsoft Tier Model + Entra ID PIM
- Tier 0 – Privileged workstations only (PAW/SAW), no internet access, AppLocker + WDAC whitelisting
- Just-in-time elevation via Privileged Identity Management with approval workflow and time-bound roles (max 8 hours)
- Mandatory session recording via Microsoft Defender for Cloud Apps or BeyondTrust PRA
BeyondTrust Endpoint Privilege Management + Active Directory bridging
- Local Administrator password solution (LAPS) replaced by on-demand local admin rights via policy
- Application control to elevate only approved installers (MSIs signed by corporate certificate)
Browse BeyondTrust Privileged Access Management technical documentation
Ottawa and Government of Canada Compliance Mapping
Ottawa organizations must map IAM controls to multiple frameworks simultaneously
ITSG-33 / GC CSE Baseline Controls
- AC-2(7) – Account Management | Automated System Account Management
- AC-6(8) – Least Privilege | Privileged Access by Non-Privileged Users (JIT)
- IA-2(12) – Identity Proofing | Phishing-Resistant MFA for Privileged Users
- IA-5(13) – Authenticator Management | FIDO2 or PKI for all privileged accounts
PIPEDA and PHIPA (for Ontario health-adjacent orgs) require demonstrable access controls and audit logging for personal information.
View Canadian Centre for Cyber Security ITSG-31 User Authentication Guidance
Identity Governance and Administration at Scale
Manual access reviews no longer scale. AI-augmented IGA platforms now perform
- Continuous micro-certifications (daily instead of quarterly)
- Peer and manager-based access recommendations using behavioural analytics
- Automatic revocation of entitlements when a user’s risk score exceeds threshold
SailPoint IdentityNow and Saviynt IGA both integrate natively with ServiceNow HR Service Delivery for birthright access and Okta Lifecycle Management workflows.
Discover SailPoint Identity Governance technical overview
Integrating IAM with XDR and SIEM
Identity is the first signal in the kill chain. Modern integrations
- Entra ID sign-in logs ? Microsoft Sentinel with KQL fusion rules for impossible travel and AADConnect account compromise
- CrowdStrike Identity Protection ? Falcon XDR behavioural blocking of lateral movement
- Okta System Log ? Splunk or Elastic with pre-built threat hunting dashboards
Learn about CrowdStrike Identity Protection integration guide
Vendor Selection Criteria for 2025
Technical evaluation matrix used by most Ottawa RFPs
| Requirement | Must-Have Scoring |
| Native FIDO2 + CBA support | 25 |
| SCIM 2.0 provisioning for 150+ SaaS apps | 20 |
| Just-in-Time + Just-Enough PAM | 20 |
| Canadian or GC-approved data residency | 15 |
| Integration with GC PKI and Entrust CA | 10 |
| Session recording and keystroke logging | 10 |
Download Gartner Magic Quadrant for Access Management 2025
180-Day Technical Roadmap (Detailed)
Phase 1 (0–60 days)
- Deploy Entra ID P2 + Identity Protection
- Enable phishing-resistant MFA for all Tier 0 and Tier 1 accounts
- Block legacy authentication tenant-wide
Phase 2 (61–120 days)
- Roll out Privileged Identity Management with approval workflow
- Implement Conditional Access device compliance (Intune)
- Deploy CrowdStrike or BeyondTrust endpoint privilege management
Phase 3 (121–180 days)
- Connect ServiceNow HR to SailPoint or Okta Workflows for automated lifecycle
- Implement machine identity rotation via HashiCorp Vault or CyberArk
- Integrate identity logs into Microsoft Sentinel with automated response playbooks
The Bottom Line
Identity is now the definitive control plane. Organizations that continue to treat IAM as a simple directory service will suffer credential-based breaches at an accelerating rate. Those that implement a complete identity fabric with phishing-resistant authentication, zero standing privilege, automated governance, and real-time risk signals will achieve measurable reductions in both breach probability and blast radius.
Bedrock IT delivers full-stack IAM modernization for Ottawa and federal contractors, including Microsoft Entra ID P2 deployments, Privileged Identity Management, CrowdStrike Identity Protection, and Canadian-hosted identity governance solutions.
Secure your identities before attackers do.
Contact us at 613-702-5505 or [email protected] for a detailed identity posture assessment and 30-day proof-of-concept.

