IAM, or Identity and Access Management, is a security discipline that enables the right individuals to access the right resources at the right times for the right reasons. One should care about IAM because it helps to protect sensitive information and resources, such as financial data or personal information, from unauthorized access, use, disclosure, disruption, modification, or destruction. Additionally, IAM can help to ensure compliance with legal and regulatory requirements related to data security, and it can help to reduce the risk of data breaches, which can be costly and damaging to an organization’s reputation.

IAM can be complex for several reasons. One reason is that it involves managing and controlling access to a wide range of resources, such as applications, servers, data storage systems, and network resources. These resources may be located on-premises or in the cloud, and they may be owned and operated by different organizations. This can make it difficult to maintain a consistent and effective security posture across the entire organization.
Another reason that IAM can be complex is that it involves managing access for a large and diverse set of users, including employees, contractors, partners, and customers. Each user may have different roles and responsibilities, and they may need access to different resources at different times. This can make it difficult to create and enforce access controls that are both effective and user-friendly.
Additionally, the rate of change in technology, the complexity of different software and tools can also make difficult to maintain and develop a proper IAM.
Finally, IAM requires constant maintenance and monitoring to ensure that access control policies are up to date and effective. This can be a significant ongoing effort, and it requires specialized skills and resources.