When a business makes use of electronic methods to store confidential data, securing such data becomes important. This article addresses one of the methods of securing organisational data; the Identity and Access Management (IAM). What Then, is IAM S...