{"id":11499,"date":"2019-01-14T09:55:54","date_gmt":"2019-01-14T08:55:54","guid":{"rendered":"https:\/\/www.riskinsight-wavestone.com\/?p=11499\/"},"modified":"2020-01-02T16:42:40","modified_gmt":"2020-01-02T15:42:40","slug":"what-is-iam-of-things","status":"publish","type":"post","link":"https:\/\/www.riskinsight-wavestone.com\/en\/2019\/01\/what-is-iam-of-things\/","title":{"rendered":"What is IAM of Things?"},"content":{"rendered":"<h2>Identity and IoT, what stakes?<\/h2>\n<p>Connected objects bring a whole range of new perspectives for the evolution of processes and working methods for businesses and users. Indeed, they are now able to interact with their environment to exchange information or perform actions. These interactions are characterized by relationships between corporate information systems, employees, end users and even other objects. To ensure the security of such exchanges, it is absolutely necessary to implement access control mechanisms which implies<strong> knowing and managing the identities of all connected objects of a fleet as well as their users.<\/strong><\/p>\n<p>This identity management discipline is well known within companies and linked to the IAM field (Identity &amp; Access Management), that means the lifecycle management of the identities of employees and partners (traditional IAM) or end clients (<a href=\"https:\/\/www.riskinsight-wavestone.com\/en\/2017\/01\/ciam-pilier-de-transformation-business\/\">Customer IAM<\/a>). It must now be applied to the fleets of connected objects: it is the <strong>IAM <em>of Things<\/em><\/strong> (IAMoT).<\/p>\n<figure id=\"post-11493 media-11493\" class=\"align-none\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-11493 size-full\" src=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2019\/01\/image-1.png\" alt=\"\" width=\"1924\" height=\"1009\" srcset=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2019\/01\/image-1.png 1924w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2019\/01\/image-1-364x191.png 364w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2019\/01\/image-1-768x403.png 768w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2019\/01\/image-1-71x37.png 71w\" sizes=\"auto, (max-width: 1924px) 100vw, 1924px\" \/><\/figure>\n<figure id=\"post-11497 media-11497\" class=\"align-none\"><\/figure>\n<p style=\"text-align: center;\"><em>Figure 1 \u2013 Traditional IAM, Customer IAM and IAMoT: three strongly related fields<\/em><\/p>\n<p>&nbsp;<\/p>\n<h2>A connected object, yes&#8230; but to WHAT?<\/h2>\n<p>The interactions between a connected object and its environment can be grouped into 3 main categories.<\/p>\n<p>&nbsp;<\/p>\n<h3>1 &#8211; An object connected to the company\u2019s IS<\/h3>\n<p>This is the first use case that comes to mind. Each object communicates with the IS via <strong>a unique identity that represents it and is associated to its access rights<\/strong>. This implies the implementation of principles for the creation, referencing, management, control and piloting of theses identities. We must <strong>know the condition of an object or the identity of its owner at any time.<\/strong><\/p>\n<p>In a standard technological chain such as \u201cobjects \u2013 relays \u2013 IoT platform \u2013 applications\u201d, <strong>the IoT platform offers a central point for managing all objects identities.<\/strong><\/p>\n<p>In this context, it is also essential to manage the authentication of objects to applications, and therefore to define the principles of creating the secrets that will be used.<\/p>\n<figure id=\"post-11495 media-11495\" class=\"align-none\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-11495\" src=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2019\/01\/image-2.png\" alt=\"\" width=\"250\" height=\"397\" srcset=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2019\/01\/image-2.png 547w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2019\/01\/image-2-120x191.png 120w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2019\/01\/image-2-25x39.png 25w\" sizes=\"auto, (max-width: 250px) 100vw, 250px\" \/><\/figure>\n<p style=\"text-align: center;\"><em>Figure 2 \u2013 Standard technological chain<\/em><\/p>\n<p>&nbsp;<\/p>\n<h3>2 &#8211; An object used by customers<\/h3>\n<p>For this type of object, appears <strong>a strong relationship with the <em>Customer IAM<\/em> field<\/strong>. Indeed, the object must be able to <strong>verify the user\u2019s identity<\/strong> against the CIAM and <strong>determine the services to which the customer has subscribed. <\/strong><\/p>\n<p>In case of shared usage of the same object, <strong>a role and data model involving different types of end-users<\/strong> must also be considered.<\/p>\n<p>Let\u2019s take the example of a connected vehicle:<\/p>\n<ul>\n<li>The vehicle driver wants to use the GPS service. Before granting access to the service, the vehicle must answer many questions. What is the identity of the driver and what personal profile should I use (in order to load his previous rides for instance)? Is he the owner of the vehicle, the driver of a rental car, or has he borrowed it for a one-time use? Has the driver subscribed to the GPS services from the manufacturer and what is his level of service (routes calculation only, or also alerts for danger zones)?<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h3>3 &#8211; An object in interaction with the company\u2019s employees and partners<\/h3>\n<p>Last use case, each object can interact with the company\u2019s employees, service providers or partners. <strong>The relationship with the traditional IAM domain<\/strong> managing the authorizations and roles of the company\u2019s partners and employees is therefore essential.<\/p>\n<p><strong>The use cases<\/strong> of an object require the creation of <strong>a role model<\/strong> to answer the question: which rights for which populations of users on which functionalities of the object?<\/p>\n<p>Let\u2019s take again the example of a connected vehicle:<\/p>\n<ul>\n<li>If repairs are needed, the mechanic must be able to view the latest vehicle\u2019s operating indicators before the breakdown for diagnostic purposes. Is this garage part of the manufacturer\u2019s network or independent? Is the mechanic allowed to access all GPS information or only the technical indicators of the engine? Can the customer consent or at least be informed of such access to his vehicle\u2019s data?<\/li>\n<\/ul>\n<p>This example also highlights that access rights may be closely linked <strong>to a time frame<\/strong> (only for the duration of the repair) or <strong>to the nature of the data<\/strong> (privacy protection of GPS data).<\/p>\n<p>&nbsp;<\/p>\n<h2>IAM of Things also means processes!<\/h2>\n<p>All IAM experts will agree: there is no IAM without a thorough study of the lifecycle of the identities involved. Our conviction is that <strong>IAMoT must study all the processes involving the object over its entire life cycle.<\/strong> Indeed, throughout the life of an object, the nature of interactions with its environment is likely to evolve according to its condition. For example, a brand-new object should be associated with its main user via a pairing process that ensures a level of trust consistent with the issues at stake\u2026<\/p>\n<p>Let\u2019s use for the last time the example of the connected vehicle:<\/p>\n<ul>\n<li><em>A person has just acquired a second-hand connected vehicle from a private owner. In the context of this resale, it is necessary for the new purchaser to ensure that all accesses to services will be properly revoked for the previous owner. The detection of the resale event must therefore trigger a process of un-pairing the former owner.<\/em><\/li>\n<\/ul>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-11497 size-full\" src=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2019\/01\/image3.png\" alt=\"\" width=\"1354\" height=\"544\" srcset=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2019\/01\/image3.png 1354w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2019\/01\/image3-437x176.png 437w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2019\/01\/image3-768x309.png 768w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2019\/01\/image3-71x29.png 71w\" sizes=\"auto, (max-width: 1354px) 100vw, 1354px\" \/><\/p>\n<p style=\"text-align: center;\"><em>Figure <\/em><em>3<\/em><em> \u2013 Ingredients for the IAM of Things recipe<\/em><\/p>\n<p>&nbsp;<\/p>\n<h2>The IAM of Things, a new discipline based on mastered concepts<\/h2>\n<p>This article highlights the identity management issue for the IoT and underlines the existing links with other fields of the IAM. It is important to keep in mind that even if <strong>the fundamental principles of the IAM also apply<\/strong> to the identity of connected objects, <strong>responses adapted to each project\u2019s context<\/strong> must be carefully studied.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Identity and IoT, what stakes? Connected objects bring a whole range of new perspectives for the evolution of processes and working methods for businesses and users. Indeed, they are now able to interact with their environment to exchange information or&#8230;<\/p>\n","protected":false},"author":1326,"featured_media":11327,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"page-templates\/tmpl-one.php","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[2777,3272],"tags":[3329,3330,3331,3078,2827,3181],"coauthors":[3051,3053],"class_list":["post-11499","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity-digital-trust","category-digital-identity-en","tag-ciam-en","tag-customer-iam-en","tag-iam-en","tag-iam-of-things","tag-identity","tag-iot-en"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>What is IAM of Things? - RiskInsight<\/title>\n<meta name=\"description\" content=\"Connected objects bring a whole range of new perspectives for the evolution of processes and working methods for businesses and users.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.riskinsight-wavestone.com\/en\/2019\/01\/what-is-iam-of-things\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What is IAM of Things? - RiskInsight\" \/>\n<meta property=\"og:description\" content=\"Connected objects bring a whole range of new perspectives for the evolution of processes and working methods for businesses and users.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.riskinsight-wavestone.com\/en\/2019\/01\/what-is-iam-of-things\/\" \/>\n<meta property=\"og:site_name\" content=\"RiskInsight\" \/>\n<meta property=\"article:published_time\" content=\"2019-01-14T08:55:54+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-01-02T15:42:40+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2018\/10\/Fotolia_81590429_Subscription_Monthly_XXL.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"6000\" \/>\n\t<meta property=\"og:image:height\" content=\"3000\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"K\u00e9vin Gu\u00e9rin\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"K\u00e9vin Gu\u00e9rin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2019\/01\/what-is-iam-of-things\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2019\/01\/what-is-iam-of-things\/\"},\"author\":{\"name\":\"K\u00e9vin Gu\u00e9rin\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/424dd5b706cf16b69aa72cb8f41c9175\"},\"headline\":\"What is IAM of Things?\",\"datePublished\":\"2019-01-14T08:55:54+00:00\",\"dateModified\":\"2020-01-02T15:42:40+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2019\/01\/what-is-iam-of-things\/\"},\"wordCount\":925,\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2019\/01\/what-is-iam-of-things\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2018\/10\/Fotolia_81590429_Subscription_Monthly_XXL.jpg\",\"keywords\":[\"CIAM\",\"customer IAM\",\"IAM\",\"IAM of Things\",\"identity\",\"IoT\"],\"articleSection\":[\"Cybersecurity &amp; Digital Trust\",\"Digital Identity\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2019\/01\/what-is-iam-of-things\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2019\/01\/what-is-iam-of-things\/\",\"name\":\"What is IAM of Things? - RiskInsight\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2019\/01\/what-is-iam-of-things\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2019\/01\/what-is-iam-of-things\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2018\/10\/Fotolia_81590429_Subscription_Monthly_XXL.jpg\",\"datePublished\":\"2019-01-14T08:55:54+00:00\",\"dateModified\":\"2020-01-02T15:42:40+00:00\",\"description\":\"Connected objects bring a whole range of new perspectives for the evolution of processes and working methods for businesses and users.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2019\/01\/what-is-iam-of-things\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.riskinsight-wavestone.com\/en\/2019\/01\/what-is-iam-of-things\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2019\/01\/what-is-iam-of-things\/#primaryimage\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2018\/10\/Fotolia_81590429_Subscription_Monthly_XXL.jpg\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2018\/10\/Fotolia_81590429_Subscription_Monthly_XXL.jpg\",\"width\":6000,\"height\":3000,\"caption\":\"Internet of Things flat iconic illustration thing object\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2019\/01\/what-is-iam-of-things\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What is IAM of Things?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"name\":\"RiskInsight\",\"description\":\"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants\",\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\",\"name\":\"Wavestone\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"width\":50,\"height\":50,\"caption\":\"Wavestone\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/424dd5b706cf16b69aa72cb8f41c9175\",\"name\":\"K\u00e9vin Gu\u00e9rin\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/author\/kevin-guerin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What is IAM of Things? - RiskInsight","description":"Connected objects bring a whole range of new perspectives for the evolution of processes and working methods for businesses and users.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.riskinsight-wavestone.com\/en\/2019\/01\/what-is-iam-of-things\/","og_locale":"en_US","og_type":"article","og_title":"What is IAM of Things? - RiskInsight","og_description":"Connected objects bring a whole range of new perspectives for the evolution of processes and working methods for businesses and users.","og_url":"https:\/\/www.riskinsight-wavestone.com\/en\/2019\/01\/what-is-iam-of-things\/","og_site_name":"RiskInsight","article_published_time":"2019-01-14T08:55:54+00:00","article_modified_time":"2020-01-02T15:42:40+00:00","og_image":[{"width":6000,"height":3000,"url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2018\/10\/Fotolia_81590429_Subscription_Monthly_XXL.jpg","type":"image\/jpeg"}],"author":"K\u00e9vin Gu\u00e9rin","twitter_misc":{"Written by":"K\u00e9vin Gu\u00e9rin","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2019\/01\/what-is-iam-of-things\/#article","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2019\/01\/what-is-iam-of-things\/"},"author":{"name":"K\u00e9vin Gu\u00e9rin","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/424dd5b706cf16b69aa72cb8f41c9175"},"headline":"What is IAM of Things?","datePublished":"2019-01-14T08:55:54+00:00","dateModified":"2020-01-02T15:42:40+00:00","mainEntityOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2019\/01\/what-is-iam-of-things\/"},"wordCount":925,"publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2019\/01\/what-is-iam-of-things\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2018\/10\/Fotolia_81590429_Subscription_Monthly_XXL.jpg","keywords":["CIAM","customer IAM","IAM","IAM of Things","identity","IoT"],"articleSection":["Cybersecurity &amp; Digital Trust","Digital Identity"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2019\/01\/what-is-iam-of-things\/","url":"https:\/\/www.riskinsight-wavestone.com\/en\/2019\/01\/what-is-iam-of-things\/","name":"What is IAM of Things? - RiskInsight","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2019\/01\/what-is-iam-of-things\/#primaryimage"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2019\/01\/what-is-iam-of-things\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2018\/10\/Fotolia_81590429_Subscription_Monthly_XXL.jpg","datePublished":"2019-01-14T08:55:54+00:00","dateModified":"2020-01-02T15:42:40+00:00","description":"Connected objects bring a whole range of new perspectives for the evolution of processes and working methods for businesses and users.","breadcrumb":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2019\/01\/what-is-iam-of-things\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.riskinsight-wavestone.com\/en\/2019\/01\/what-is-iam-of-things\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2019\/01\/what-is-iam-of-things\/#primaryimage","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2018\/10\/Fotolia_81590429_Subscription_Monthly_XXL.jpg","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2018\/10\/Fotolia_81590429_Subscription_Monthly_XXL.jpg","width":6000,"height":3000,"caption":"Internet of Things flat iconic illustration thing object"},{"@type":"BreadcrumbList","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2019\/01\/what-is-iam-of-things\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.riskinsight-wavestone.com\/en\/"},{"@type":"ListItem","position":2,"name":"What is IAM of Things?"}]},{"@type":"WebSite","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","name":"RiskInsight","description":"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants","publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization","name":"Wavestone","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","width":50,"height":50,"caption":"Wavestone"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/424dd5b706cf16b69aa72cb8f41c9175","name":"K\u00e9vin Gu\u00e9rin","url":"https:\/\/www.riskinsight-wavestone.com\/en\/author\/kevin-guerin\/"}]}},"_links":{"self":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/11499","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/users\/1326"}],"replies":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/comments?post=11499"}],"version-history":[{"count":2,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/11499\/revisions"}],"predecessor-version":[{"id":11501,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/11499\/revisions\/11501"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media\/11327"}],"wp:attachment":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media?parent=11499"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/categories?post=11499"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/tags?post=11499"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/coauthors?post=11499"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}