{"id":35075,"date":"2025-09-17T11:02:02","date_gmt":"2025-09-17T15:02:02","guid":{"rendered":"https:\/\/www.rsa.com\/?p=35075"},"modified":"2025-09-17T11:02:02","modified_gmt":"2025-09-17T15:02:02","slug":"the-hidden-costs-of-manual-identity-governance","status":"publish","type":"post","link":"https:\/\/www.rsa.com\/fr\/resources\/blog\/identity-governance-and-administration\/the-hidden-costs-of-manual-identity-governance\/","title":{"rendered":"Les co\u00fbts cach\u00e9s de la gouvernance manuelle des identit\u00e9s"},"content":{"rendered":"","protected":false},"excerpt":{"rendered":"","protected":false},"author":6,"featured_media":35078,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_searchwp_excluded":"","inline_featured_image":false,"footnotes":""},"categories":[166],"tags":[],"class_list":["post-35075","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-identity-governance-and-administration"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>The Hidden Costs of Manual Identity Governance - RSA<\/title>\n<meta name=\"description\" content=\"Learn why manual identity governance and administration (IGA) slows operations, creates access inconsistencies, and spreads risks.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.rsa.com\/fr\/resources\/blog\/identity-governance-and-administration\/the-hidden-costs-of-manual-identity-governance\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Hidden Costs of Manual Identity Governance | RSA Blog\" \/>\n<meta property=\"og:description\" content=\"Read the blog to see why manual identity governance and administration (IGA) processes slow operation, creates access inconsistencies, and spreads risks\u2014and learn how AI and automation can make IGA faster, smarter, and more effective.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.rsa.com\/fr\/resources\/blog\/identity-governance-and-administration\/the-hidden-costs-of-manual-identity-governance\/\" \/>\n<meta property=\"og:site_name\" content=\"RSA\" \/>\n<meta property=\"article:published_time\" content=\"2025-09-17T15:02:02+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.rsa.com\/wp-content\/uploads\/the-hidden-costs-of-manual-identity-governance-rsa-social.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"Ben Lebeaux\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"The Hidden Costs of Manual Identity Governance | RSA Blog\" \/>\n<meta name=\"twitter:description\" content=\"Read the blog to see why manual identity governance and administration (IGA) processes slow operation, creates access inconsistencies, and spreads risks\u2014and learn how AI and automation can make IGA faster, smarter, and more effective.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.rsa.com\/wp-content\/uploads\/the-hidden-costs-of-manual-identity-governance-rsa-social.webp\" \/>\n<meta name=\"twitter:creator\" content=\"@bcomroe@logical-inc.com\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":[\"Article\",\"BlogPosting\"],\"@id\":\"https:\\\/\\\/www.rsa.com\\\/id\\\/resources\\\/blog\\\/identity-governance-and-administration\\\/the-hidden-costs-of-manual-identity-governance\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/id\\\/resources\\\/blog\\\/identity-governance-and-administration\\\/the-hidden-costs-of-manual-identity-governance\\\/\"},\"author\":{\"name\":\"Ben Lebeaux\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#\\\/schema\\\/person\\\/597f5b8f2d9eb8876c9be212f4dcdce9\"},\"headline\":\"The Hidden Costs of Manual Identity Governance\",\"datePublished\":\"2025-09-17T15:02:02+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/id\\\/resources\\\/blog\\\/identity-governance-and-administration\\\/the-hidden-costs-of-manual-identity-governance\\\/\"},\"wordCount\":7,\"publisher\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/id\\\/resources\\\/blog\\\/identity-governance-and-administration\\\/the-hidden-costs-of-manual-identity-governance\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.rsa.com\\\/wp-content\\\/uploads\\\/the-hidden-costs-of-manual-identity-governance-rsa-blog.webp\",\"articleSection\":[\"Identity Governance &amp; Administration\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/id\\\/resources\\\/blog\\\/identity-governance-and-administration\\\/the-hidden-costs-of-manual-identity-governance\\\/\",\"url\":\"https:\\\/\\\/www.rsa.com\\\/id\\\/resources\\\/blog\\\/identity-governance-and-administration\\\/the-hidden-costs-of-manual-identity-governance\\\/\",\"name\":\"The Hidden Costs of Manual Identity Governance - RSA\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/id\\\/resources\\\/blog\\\/identity-governance-and-administration\\\/the-hidden-costs-of-manual-identity-governance\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/id\\\/resources\\\/blog\\\/identity-governance-and-administration\\\/the-hidden-costs-of-manual-identity-governance\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.rsa.com\\\/wp-content\\\/uploads\\\/the-hidden-costs-of-manual-identity-governance-rsa-blog.webp\",\"datePublished\":\"2025-09-17T15:02:02+00:00\",\"description\":\"Learn why manual identity governance and administration (IGA) slows operations, creates access inconsistencies, and spreads risks.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/id\\\/resources\\\/blog\\\/identity-governance-and-administration\\\/the-hidden-costs-of-manual-identity-governance\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.rsa.com\\\/id\\\/resources\\\/blog\\\/identity-governance-and-administration\\\/the-hidden-costs-of-manual-identity-governance\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/id\\\/resources\\\/blog\\\/identity-governance-and-administration\\\/the-hidden-costs-of-manual-identity-governance\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.rsa.com\\\/wp-content\\\/uploads\\\/the-hidden-costs-of-manual-identity-governance-rsa-blog.webp\",\"contentUrl\":\"https:\\\/\\\/www.rsa.com\\\/wp-content\\\/uploads\\\/the-hidden-costs-of-manual-identity-governance-rsa-blog.webp\",\"width\":1200,\"height\":630,\"caption\":\"The Hidden Costs of Manual Identity Governance\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/id\\\/resources\\\/blog\\\/identity-governance-and-administration\\\/the-hidden-costs-of-manual-identity-governance\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.rsa.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The Hidden Costs of Manual Identity Governance\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#website\",\"url\":\"https:\\\/\\\/www.rsa.com\\\/\",\"name\":\"RSA\",\"description\":\"Cybersecurity and Digital Risk Management Solutions\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.rsa.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#organization\",\"name\":\"RSA\",\"url\":\"https:\\\/\\\/www.rsa.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.rsa.com\\\/wp-content\\\/uploads\\\/rsa.png\",\"contentUrl\":\"https:\\\/\\\/www.rsa.com\\\/wp-content\\\/uploads\\\/rsa.png\",\"width\":2880,\"height\":1020,\"caption\":\"RSA\"},\"image\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#\\\/schema\\\/person\\\/597f5b8f2d9eb8876c9be212f4dcdce9\",\"name\":\"Ben Lebeaux\",\"sameAs\":[\"https:\\\/\\\/x.com\\\/bcomroe@logical-inc.com\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Les co\u00fbts cach\u00e9s de la gouvernance manuelle des identit\u00e9s - RSA","description":"D\u00e9couvrez pourquoi la gouvernance et l'administration des identit\u00e9s (IGA) manuelles ralentissent les op\u00e9rations, cr\u00e9ent des incoh\u00e9rences d'acc\u00e8s et propagent les risques.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.rsa.com\/fr\/resources\/blog\/identity-governance-and-administration\/the-hidden-costs-of-manual-identity-governance\/","og_locale":"fr_FR","og_type":"article","og_title":"The Hidden Costs of Manual Identity Governance | RSA Blog","og_description":"Read the blog to see why manual identity governance and administration (IGA) processes slow operation, creates access inconsistencies, and spreads risks\u2014and learn how AI and automation can make IGA faster, smarter, and more effective.","og_url":"https:\/\/www.rsa.com\/fr\/resources\/blog\/identity-governance-and-administration\/the-hidden-costs-of-manual-identity-governance\/","og_site_name":"RSA","article_published_time":"2025-09-17T15:02:02+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/www.rsa.com\/wp-content\/uploads\/the-hidden-costs-of-manual-identity-governance-rsa-social.webp","type":"image\/webp"}],"author":"Ben Lebeaux","twitter_card":"summary_large_image","twitter_title":"The Hidden Costs of Manual Identity Governance | RSA Blog","twitter_description":"Read the blog to see why manual identity governance and administration (IGA) processes slow operation, creates access inconsistencies, and spreads risks\u2014and learn how AI and automation can make IGA faster, smarter, and more effective.","twitter_image":"https:\/\/www.rsa.com\/wp-content\/uploads\/the-hidden-costs-of-manual-identity-governance-rsa-social.webp","twitter_creator":"@bcomroe@logical-inc.com","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":["Article","BlogPosting"],"@id":"https:\/\/www.rsa.com\/id\/resources\/blog\/identity-governance-and-administration\/the-hidden-costs-of-manual-identity-governance\/#article","isPartOf":{"@id":"https:\/\/www.rsa.com\/id\/resources\/blog\/identity-governance-and-administration\/the-hidden-costs-of-manual-identity-governance\/"},"author":{"name":"Ben Lebeaux","@id":"https:\/\/www.rsa.com\/#\/schema\/person\/597f5b8f2d9eb8876c9be212f4dcdce9"},"headline":"The Hidden Costs of Manual Identity Governance","datePublished":"2025-09-17T15:02:02+00:00","mainEntityOfPage":{"@id":"https:\/\/www.rsa.com\/id\/resources\/blog\/identity-governance-and-administration\/the-hidden-costs-of-manual-identity-governance\/"},"wordCount":7,"publisher":{"@id":"https:\/\/www.rsa.com\/#organization"},"image":{"@id":"https:\/\/www.rsa.com\/id\/resources\/blog\/identity-governance-and-administration\/the-hidden-costs-of-manual-identity-governance\/#primaryimage"},"thumbnailUrl":"https:\/\/www.rsa.com\/wp-content\/uploads\/the-hidden-costs-of-manual-identity-governance-rsa-blog.webp","articleSection":["Identity Governance &amp; Administration"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/www.rsa.com\/id\/resources\/blog\/identity-governance-and-administration\/the-hidden-costs-of-manual-identity-governance\/","url":"https:\/\/www.rsa.com\/id\/resources\/blog\/identity-governance-and-administration\/the-hidden-costs-of-manual-identity-governance\/","name":"Les co\u00fbts cach\u00e9s de la gouvernance manuelle des identit\u00e9s - RSA","isPartOf":{"@id":"https:\/\/www.rsa.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.rsa.com\/id\/resources\/blog\/identity-governance-and-administration\/the-hidden-costs-of-manual-identity-governance\/#primaryimage"},"image":{"@id":"https:\/\/www.rsa.com\/id\/resources\/blog\/identity-governance-and-administration\/the-hidden-costs-of-manual-identity-governance\/#primaryimage"},"thumbnailUrl":"https:\/\/www.rsa.com\/wp-content\/uploads\/the-hidden-costs-of-manual-identity-governance-rsa-blog.webp","datePublished":"2025-09-17T15:02:02+00:00","description":"D\u00e9couvrez pourquoi la gouvernance et l'administration des identit\u00e9s (IGA) manuelles ralentissent les op\u00e9rations, cr\u00e9ent des incoh\u00e9rences d'acc\u00e8s et propagent les risques.","breadcrumb":{"@id":"https:\/\/www.rsa.com\/id\/resources\/blog\/identity-governance-and-administration\/the-hidden-costs-of-manual-identity-governance\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.rsa.com\/id\/resources\/blog\/identity-governance-and-administration\/the-hidden-costs-of-manual-identity-governance\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.rsa.com\/id\/resources\/blog\/identity-governance-and-administration\/the-hidden-costs-of-manual-identity-governance\/#primaryimage","url":"https:\/\/www.rsa.com\/wp-content\/uploads\/the-hidden-costs-of-manual-identity-governance-rsa-blog.webp","contentUrl":"https:\/\/www.rsa.com\/wp-content\/uploads\/the-hidden-costs-of-manual-identity-governance-rsa-blog.webp","width":1200,"height":630,"caption":"The Hidden Costs of Manual Identity Governance"},{"@type":"BreadcrumbList","@id":"https:\/\/www.rsa.com\/id\/resources\/blog\/identity-governance-and-administration\/the-hidden-costs-of-manual-identity-governance\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.rsa.com\/"},{"@type":"ListItem","position":2,"name":"The Hidden Costs of Manual Identity Governance"}]},{"@type":"WebSite","@id":"https:\/\/www.rsa.com\/#website","url":"https:\/\/www.rsa.com\/","name":"RSA","description":"Solutions de cybers\u00e9curit\u00e9 et de gestion des risques num\u00e9riques","publisher":{"@id":"https:\/\/www.rsa.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.rsa.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.rsa.com\/#organization","name":"RSA","url":"https:\/\/www.rsa.com\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.rsa.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.rsa.com\/wp-content\/uploads\/rsa.png","contentUrl":"https:\/\/www.rsa.com\/wp-content\/uploads\/rsa.png","width":2880,"height":1020,"caption":"RSA"},"image":{"@id":"https:\/\/www.rsa.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.rsa.com\/#\/schema\/person\/597f5b8f2d9eb8876c9be212f4dcdce9","name":"Ben Lebeaux","sameAs":["https:\/\/x.com\/bcomroe@logical-inc.com"]}]}},"_links":{"self":[{"href":"https:\/\/www.rsa.com\/fr\/wp-json\/wp\/v2\/posts\/35075","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.rsa.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.rsa.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.rsa.com\/fr\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/www.rsa.com\/fr\/wp-json\/wp\/v2\/comments?post=35075"}],"version-history":[{"count":3,"href":"https:\/\/www.rsa.com\/fr\/wp-json\/wp\/v2\/posts\/35075\/revisions"}],"predecessor-version":[{"id":35083,"href":"https:\/\/www.rsa.com\/fr\/wp-json\/wp\/v2\/posts\/35075\/revisions\/35083"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.rsa.com\/fr\/wp-json\/wp\/v2\/media\/35078"}],"wp:attachment":[{"href":"https:\/\/www.rsa.com\/fr\/wp-json\/wp\/v2\/media?parent=35075"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.rsa.com\/fr\/wp-json\/wp\/v2\/categories?post=35075"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.rsa.com\/fr\/wp-json\/wp\/v2\/tags?post=35075"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}