Also known as identity and access management (IAM), identity management ensures that the right people have access to the systems and information needed to do their jobs and nothing more. But, one of the pervasive concerns regarding the IoT is that many of the associated technologies were not built with IAM in mind.

Credential abuse is already problematic

Credential abuse or misuse happens when people attempt to access or successfully access systems by circumventing the access control systems that are in place. Sometimes this happens when people innocently do things to try and help their colleagues, such as sharing passwords with them to avoid delays while those people wait for IT department personnel to give them their passwords. Read more..