Decision guide · Security
How to choose an IAM, IGA and PAM stack
IAM decisions rarely fail on the core identity provider. They fail at the governance and privileged-access layers, because those two sub-decisions get bundled into the IAM RFP and never get their own weighted scoring. The right decision structure keeps IAM, IGA and PAM as three overlapping but individually-scored decisions, with sovereignty and federation as upstream dealbreakers.
TL;DR
Treat IAM, IGA and PAM as three decisions, not one.
Who owns this decision
CISO or IAM-lead as decision owner, IT Security, IT Operations, HR-IT and a Data Protection Officer as stakeholders.
Key criteria to weight
Federation coverage
SAML, OIDC, SCIM depth across your actual application landscape. Coverage gaps become integration projects.
Lifecycle automation
Joiner-mover-leaver without manual tickets. Directly affects audit findings.
Governance and access review depth
Certifications, SoD analytics, campaign workflow. Weak here means IGA as a separate decision.
Privileged access and session control
Vaulting, session recording, just-in-time elevation. Often a separate PAM decision.
Sovereignty and hosting
EU-hosted tenant, key management, sovereign cloud eligibility. Frequently a dealbreaker.
TCO and connector cost
Per-identity pricing versus flat. Connector fees. Professional services dominate year 1.
Step-by-step decision flow
- 1
Split the decision
Explicitly decide whether IAM, IGA and PAM are one decision or three. Re-bundle only if stakeholders and budgets genuinely overlap.
- 2
Set sovereignty dealbreakers
EU-hosted, key control, federated identity across sovereign boundaries. Not scored, binary.
- 3
Map your applications
The federation matrix decides which vendor actually fits. Walk the top 50 applications and their protocols.
- 4
Weight governance criteria
If you are in NIS2 / DORA scope, governance weights rise substantially.
- 5
Pilot with real lifecycle events
Joiner, mover, leaver, offboarding. Time them. Watch the SoD logic. Do not let vendors demo happy-path only.
- 6
Produce the memo
Per-sub-decision sections (IAM / IGA / PAM) with weighted scoring, dealbreakers, risks and decision rationale.
Vendor market structure
Strukturvergleich der relevanten IAM/IGA/PAM-Stacks für DACH-Enterprise unter NIS2 und DORA.
| Vendor | IAM/IGA/PAM-Coverage | EU-Hosting | Federation-Tiefe | Lifecycle-Automation | Listenpreis pro User/Monat | IGA-Tiefe |
|---|---|---|---|---|---|---|
| Microsoft Entra ID ↗ | IAM Core, Governance/PAM über separate SKU | EU Data Boundary | Sehr breit, native im M365-Kontext | Lifecycle Workflows in P2/Governance | ab 6 USD P1, 9 USD P2 plus Governance-SKU | Entra ID Governance separate Lizenz |
| Okta Workforce Identity ↗ | IAM Core plus Lifecycle/IGA-SKU | EU-Cell verfügbar | Sehr breit, App-Catalog stark | Lifecycle Management Modul | ab 2 USD SSO bis 15+ USD Lifecycle | Okta Identity Governance separates Modul |
| Ping Identity ↗ | IAM Core, IGA via PingOne for Enterprise | EU-Hosting verfügbar | Sehr tief, Federation-Spezialist | Provisioning über PingOne | auf Anfrage | PingOne Neo / Davinci IGA |
| ForgeRock (Ping) ↗ | IAM Core, Governance/IGA Modular | EU-Hosting verfügbar | Sehr tief, sehr konfigurierbar | ForgeRock Identity Governance | auf Anfrage | Native IGA-Module |
| SailPoint Identity Security Cloud ↗ | IGA-First mit IAM-Bridge zu Drittanbietern | EU-Hosting verfügbar | Mittel, Fokus liegt auf Governance | Sehr breit, Governance-zentrisch | auf Anfrage, Enterprise-Tier | Marktführend in IGA |
| OneLogin (One Identity) ↗ | IAM Core plus optionale IGA-Module | EU-Hosting verfügbar | Breite Coverage | OneLogin Mappings | ab 2 USD bis 8 USD pro User/Monat | Begrenzt, ergänzt durch One Identity Manager |
| CyberArk Identity / Workforce ↗ | PAM-First plus Workforce Identity | EU-Hosting verfügbar | SSO mit M365- und SaaS-Fokus | über Identity Compliance Modul | auf Anfrage | Identity Compliance separates Modul |
Stand: 2026-04. Basierend auf öffentlich zugänglichen Vendor-Angaben. Stand April 2026. Eigene Validierung über DecisionOS-Profil empfohlen.
Anonymised memo excerpt
Versicherer, 1200 Mitarbeiter, DORA in scope, mehrere Legacy-Bestandssysteme
Readiness score
74
- Trigger
- DORA Art. 9 fordert ein dokumentiertes Identity-Management, das für ICT-Drittanbieter-Risiken transparent ist. Die bestehende AD-zentrische Architektur erfüllt die Audit-Anforderungen nicht ohne Erweiterung.
- Top criteria (weights)
- Federation-Tiefe und SaaS-Coverage20%
- IGA-Reife und Access Reviews25%
- EU-Hosting und Sovereign-Option15%
- PAM-Integration15%
- Lifecycle-Automation15%
- TCO Jahr 1-310%
- Shortlist
- Microsoft Entra ID P2 plus Entra ID Governance
- Okta Workforce Identity plus Okta Identity Governance
- SailPoint Identity Security Cloud plus Entra IAM-Bridge
- Decision
- Microsoft Entra ID P2 plus Entra ID Governance für Workforce Identity. PAM über dedizierten CyberArk-Vertrag.
- Rationale
- Entra-Lock-in ist akzeptabel, weil das Bestandssystem bereits Microsoft-zentrisch ist und Compliance-Reporting nativ integriert ist. SailPoint deckt die IGA-Tiefe, war aber als Add-on überkompliziert. Okta scheiterte an EU Data Boundary-Tiefe und Lifecycle-Connector-Aufwand.
- Residual risks
- PAM-Workflow noch nicht in Entra-IGA-Reviews integriert
- SoD-Analytik für Solvency-II-relevante Rollen muss in Phase 2 ergänzt werden
Compliance note
NIS2 Art. 21 expects identity and access management as a named measure. DORA Art. 9 and 28 add explicit expectations on ICT risk management around identity. Under both, the decision memo is the evidence file.
Common pitfalls
- !Bundling IAM, IGA and PAM into a single RFP with one weighted score.
- !Under-weighting legacy connector requirements.
- !Ignoring IGA until after IAM contract signature, then paying twice.
- !Skipping sovereignty dealbreakers for public-sector workloads.
FAQ
What is the difference between IAM, IGA and PAM?
IAM (Identity and Access Management) covers the broad category. IGA (Identity Governance and Administration) is the governance-heavy subset: access reviews, SoD, joiner-mover-leaver. PAM (Privileged Access Management) focuses on elevated accounts and session recording. Most enterprise decisions involve an IAM core plus an IGA and PAM overlay.
Do I need a separate IGA product, or does my IAM platform cover it?
Many IAM platforms (Entra ID, Okta, Ping) bundle baseline governance. Deep IGA needs, certifications, SoD analytics, connectors to legacy systems, often still drive a separate IGA platform. The decision memo should surface this as an explicit dealbreaker if you are under NIS2 or DORA scope.
Is sovereign IAM a hard requirement in the EU?
For most enterprises, no; for sovereign-cloud candidates and public-sector workloads, yes. DecisionOS treats sovereignty as a dealbreaker that is toggled on or off at the start of the decision, not as a scored criterion.
Related decision guides
Security
How to choose an EDR or XDR platform in 2026
Infrastructure
How to make a sovereign cloud migration decision
Compliance
How to reach NIS2 readiness as a mid-market or enterprise operator
Security
How to choose an IAM, IGA and PAM stack
Infrastructure
How to decide on IT outsourcing, a structured framework
Related comparisons
DecisionOS vs OneTrust
OneTrust manages privacy and risk continuously. DecisionOS produces the decision inside.
DecisionOS vs Aera / Tellius / DataRobot (Decision Intelligence)
Decision intelligence automates data-driven decisions. DecisionOS structures qualitative technology buying decisions. They are not substitutes.
DecisionOS vs Excel and slide decks
Spreadsheets work until the second stakeholder shows up.
DecisionOS vs RFP tools
RFP tools automate Q&A. DecisionOS runs the decision.
DecisionOS vs procurement suites
Procurement suites execute the purchase. DecisionOS makes the decision.
Relevant industries
Banken & Finanzdienstleister
Banken entscheiden unter DORA, MaRisk, BAIT gleichzeitig. DecisionOS liefert das Memo, das alle drei Prüfer akzeptieren.
Versicherungen
Versicherer entscheiden unter DORA + Solvency II + VAIT gleichzeitig. Ein Memo-Format für alle drei.
Gesundheitswesen
Gesundheitswesen: KRITIS + NIS2 + B3S + DSGVO Art. 9. DecisionOS macht das Memo prüfbar.
Telekommunikation
Telko entscheidet unter NIS2 + TKG §165 + BSI-Sicherheitskatalog gleichzeitig. Ein Memo, das alle Prüfer akzeptieren.
Manufacturing & Industrial
Manufacturing is a NIS2 important entity. OT security and supply-chain diligence are mandatory. The decision memo is the audit standard.
