When organizations invest in new software or SaaS applications, attention tends to center around features, functionality, and return on investment. However, one critical dimension often escapes early scrutiny: Identity and Access Management (IAM). Poor IAM alignment can quietly inflate costs, delay value realization, and expose the organization to governance and security risks.
This lesson came into sharp focus early in my career during a conversation with a CISO at a large healthcare organization. With a tight budget, they were looking to onboard several new applications into their identity management ecosystem. The goals were to streamline provisioning and de-provisioning, and centralize user access through their Identity Provider (IdP) for Single Sign-On (SSO) and Multi-Factor Authentication (MFA).
Unfortunately, many of the target applications lacked APIs and standard methods for automating provisioning, and failed to support standardized SSO protocols. The projected costs to integrate applications like these - to shoehorn them into a centrally managed IAM framework - were substantial. When I asked whether these integration costs had been factored into the initial assessment of the applications, the answer, at the time, was no. That single question led to a broader, more strategic shift.
We initiated a discussion around the creation of a questionnaire, a sort of IAM readiness checklist, that the security team could include in their vendor assessment process before a purchase decision was made. The goal was to embed security into procurement with clear, identity-centric criteria. By asking targeted questions early, they could evaluate and estimate the very real costs associated with the ongoing identity and access management processes required to maintain the application. For instance, if an application did not support any standardized SSO or provisioning - as was the case with several applications under review - it signaled tangible downstream costs. Manual account management would increase the operational workload, while compliance teams would face heightened challenges managing controls for regulatory compliance and security.
That early experience with the healthcare organization was a stark illustration of what I now call the "IAM Burden". When IAM is an afterthought in software acquisition, organizations inevitably face challenges that inflate Total Cost of Ownership (TCO) and diminish ROI:
Essentially, the operational overhead and security risks associated with poorly integrated IAM can significantly diminish, or even negate, the expected ROI - turning what seemed strategic into a persistent operational "IAM burden".
The conversation with the healthcare CISO made it clear: the vendor assessment process presents a strategic opportunity to prevent these IAM burdens. When standardized IAM integration becomes a core criterion during evaluation, vendors are more likely to deliver solutions that align with the organization’s existing identity infrastructure. This level of foresight is crucial because the costs associated with manual IAM processes and custom integrations for non-compliant software directly inflate the TCO.
That engagement with the healthcare CISO marked the first time I’d been directly involved in creating such a process, and at the time, it felt somewhat novel. Today, I’m glad to say that once-uncommon approach is now increasingly considered an industry best practice. It’s gratifying to see so many organizations embedding security and IAM considerations into the vendor evalution phase. I regularly interface with security leaders who are included early in application evaluation and vendor onboarding prior to acquisition.
I recently sat down with the CISO of another organization whose approach to IAM evaluation was both rigorous and deeply embedded. For years, their team has taken a firm stance on requiring industry-standard SSO protocols (such as SAML or OIDC) and standardized provisioning methods like SCIM - or, at minimum, robust API support for integration with their IGA tools. The impact of those long-standing practices was clear. The majority of their application portfolio integrates cleanly with their IGA and Identity Provider systems. Operational efficiency for user lifecycle management is high and compliance controls are executed with very little difficulty.
It was refreshing and validating to see such clear proof that these proactive IAM practices do, indeed, pay significant dividends over time. The initial effort to assess and demand standards had translated into years of reduced operational friction, lower TCO for their applications, and a stronger, more consistent security posture. These results aren’t coincidental. They reflect the benefits of embedding IAM strategy into procurement from the outset. Fortunately, security teams are now more frequently included in procurement discussions, equipped with standards-based evaluation tools that spotlight hidden IAM costs before they become long-term liabilities.
The success story above powerfully illustrates what happens when IAM is treated as a forethought, rather than an afterthought. By embedding IAM standards into your vendor selection criteria, you ensure that new software solutions:
This proactive approach does more than avoid common IAM pitfalls—it enhances the long-term value of your software investments by ensuring security, compliance, and operational efficiency are built in from the start.
While SCIM is a powerful tool for IGA integration, it's important to recognize that not all vendors will support it natively. Other effective methods—such as Active Directory integration and Just-in-Time (JIT) provisioning via SAML/OIDC—can still deliver strong results. IAM integration exists on a sliding scale, and while SCIM, AD integration, and JIT are generally the most effective, alternatives do exist, though they may not be as efficient.
By thoroughly assessing a vendor's IAM capabilities, including their support for SSO standards like SAML/OIDC and their provisioning methods, you can make informed decisions that protect your investment and minimize future integration complexity. A well-integrated software solution is a strategic asset, while a poorly integrated one can quickly become a costly liability.
Navigating IAM decisions can be complex and challenging, but you don't have to do it alone. As your partner, GCA can help you understand your specific needs and recommend the best approach by helping to asses your environment, identify optimal integration methods, and build a plan that maximizes ROI while keeping TCO in check. Let's work together to find the right balance on that sliding scale of integration options.