For the smaller enterprise there appear to be two paths followed: do nothing or do it poorly. When done poorly, shoddy IAM implementations can result in poor credential management, lousy availability and inappropriate access controls. Read more here…