{"id":35075,"date":"2025-09-17T11:02:02","date_gmt":"2025-09-17T15:02:02","guid":{"rendered":"https:\/\/www.rsa.com\/?p=35075"},"modified":"2025-09-17T11:02:02","modified_gmt":"2025-09-17T15:02:02","slug":"the-hidden-costs-of-manual-identity-governance","status":"publish","type":"post","link":"https:\/\/www.rsa.com\/ko\/resources\/blog\/identity-governance-and-administration\/the-hidden-costs-of-manual-identity-governance\/","title":{"rendered":"\uc218\ub3d9 ID \uac70\ubc84\ub10c\uc2a4\uc758 \uc228\uaca8\uc9c4 \ube44\uc6a9"},"content":{"rendered":"","protected":false},"excerpt":{"rendered":"","protected":false},"author":6,"featured_media":35078,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_searchwp_excluded":"","inline_featured_image":false,"footnotes":""},"categories":[166],"tags":[],"class_list":["post-35075","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-identity-governance-and-administration"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>The Hidden Costs of Manual Identity Governance - RSA<\/title>\n<meta name=\"description\" content=\"Learn why manual identity governance and administration (IGA) slows operations, creates access inconsistencies, and spreads risks.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.rsa.com\/ko\/resources\/blog\/identity-governance-and-administration\/the-hidden-costs-of-manual-identity-governance\/\" \/>\n<meta property=\"og:locale\" content=\"ko_KR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Hidden Costs of Manual Identity Governance | RSA Blog\" \/>\n<meta property=\"og:description\" content=\"Read the blog to see why manual identity governance and administration (IGA) processes slow operation, creates access inconsistencies, and spreads risks\u2014and learn how AI and automation can make IGA faster, smarter, and more effective.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.rsa.com\/ko\/resources\/blog\/identity-governance-and-administration\/the-hidden-costs-of-manual-identity-governance\/\" \/>\n<meta property=\"og:site_name\" content=\"RSA\" \/>\n<meta property=\"article:published_time\" content=\"2025-09-17T15:02:02+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.rsa.com\/wp-content\/uploads\/the-hidden-costs-of-manual-identity-governance-rsa-social.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"Ben Lebeaux\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"The Hidden Costs of Manual Identity Governance | RSA Blog\" \/>\n<meta name=\"twitter:description\" content=\"Read the blog to see why manual identity governance and administration (IGA) processes slow operation, creates access inconsistencies, and spreads risks\u2014and learn how AI and automation can make IGA faster, smarter, and more effective.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.rsa.com\/wp-content\/uploads\/the-hidden-costs-of-manual-identity-governance-rsa-social.webp\" \/>\n<meta name=\"twitter:creator\" content=\"@bcomroe@logical-inc.com\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":[\"Article\",\"BlogPosting\"],\"@id\":\"https:\\\/\\\/www.rsa.com\\\/id\\\/resources\\\/blog\\\/identity-governance-and-administration\\\/the-hidden-costs-of-manual-identity-governance\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/id\\\/resources\\\/blog\\\/identity-governance-and-administration\\\/the-hidden-costs-of-manual-identity-governance\\\/\"},\"author\":{\"name\":\"Ben Lebeaux\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#\\\/schema\\\/person\\\/597f5b8f2d9eb8876c9be212f4dcdce9\"},\"headline\":\"The Hidden Costs of Manual Identity Governance\",\"datePublished\":\"2025-09-17T15:02:02+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/id\\\/resources\\\/blog\\\/identity-governance-and-administration\\\/the-hidden-costs-of-manual-identity-governance\\\/\"},\"wordCount\":7,\"publisher\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/id\\\/resources\\\/blog\\\/identity-governance-and-administration\\\/the-hidden-costs-of-manual-identity-governance\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.rsa.com\\\/wp-content\\\/uploads\\\/the-hidden-costs-of-manual-identity-governance-rsa-blog.webp\",\"articleSection\":[\"Identity Governance &amp; Administration\"],\"inLanguage\":\"ko-KR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/id\\\/resources\\\/blog\\\/identity-governance-and-administration\\\/the-hidden-costs-of-manual-identity-governance\\\/\",\"url\":\"https:\\\/\\\/www.rsa.com\\\/id\\\/resources\\\/blog\\\/identity-governance-and-administration\\\/the-hidden-costs-of-manual-identity-governance\\\/\",\"name\":\"The Hidden Costs of Manual Identity Governance - RSA\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/id\\\/resources\\\/blog\\\/identity-governance-and-administration\\\/the-hidden-costs-of-manual-identity-governance\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/id\\\/resources\\\/blog\\\/identity-governance-and-administration\\\/the-hidden-costs-of-manual-identity-governance\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.rsa.com\\\/wp-content\\\/uploads\\\/the-hidden-costs-of-manual-identity-governance-rsa-blog.webp\",\"datePublished\":\"2025-09-17T15:02:02+00:00\",\"description\":\"Learn why manual identity governance and administration (IGA) slows operations, creates access inconsistencies, and spreads risks.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/id\\\/resources\\\/blog\\\/identity-governance-and-administration\\\/the-hidden-costs-of-manual-identity-governance\\\/#breadcrumb\"},\"inLanguage\":\"ko-KR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.rsa.com\\\/id\\\/resources\\\/blog\\\/identity-governance-and-administration\\\/the-hidden-costs-of-manual-identity-governance\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"ko-KR\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/id\\\/resources\\\/blog\\\/identity-governance-and-administration\\\/the-hidden-costs-of-manual-identity-governance\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.rsa.com\\\/wp-content\\\/uploads\\\/the-hidden-costs-of-manual-identity-governance-rsa-blog.webp\",\"contentUrl\":\"https:\\\/\\\/www.rsa.com\\\/wp-content\\\/uploads\\\/the-hidden-costs-of-manual-identity-governance-rsa-blog.webp\",\"width\":1200,\"height\":630,\"caption\":\"The Hidden Costs of Manual Identity Governance\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/id\\\/resources\\\/blog\\\/identity-governance-and-administration\\\/the-hidden-costs-of-manual-identity-governance\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.rsa.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The Hidden Costs of Manual Identity Governance\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#website\",\"url\":\"https:\\\/\\\/www.rsa.com\\\/\",\"name\":\"RSA\",\"description\":\"Cybersecurity and Digital Risk Management Solutions\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.rsa.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"ko-KR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#organization\",\"name\":\"RSA\",\"url\":\"https:\\\/\\\/www.rsa.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ko-KR\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.rsa.com\\\/wp-content\\\/uploads\\\/rsa.png\",\"contentUrl\":\"https:\\\/\\\/www.rsa.com\\\/wp-content\\\/uploads\\\/rsa.png\",\"width\":2880,\"height\":1020,\"caption\":\"RSA\"},\"image\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#\\\/schema\\\/person\\\/597f5b8f2d9eb8876c9be212f4dcdce9\",\"name\":\"Ben Lebeaux\",\"sameAs\":[\"https:\\\/\\\/x.com\\\/bcomroe@logical-inc.com\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"\uc218\ub3d9 ID \uac70\ubc84\ub10c\uc2a4\uc758 \uc228\uaca8\uc9c4 \ube44\uc6a9 - RSA","description":"\uc218\ub3d9 IGA(ID \uac70\ubc84\ub10c\uc2a4 \ubc0f \uad00\ub9ac)\ub85c \uc778\ud574 \uc6b4\uc601 \uc18d\ub3c4\uac00 \ub290\ub824\uc9c0\uace0, \uc561\uc138\uc2a4 \ubd88\uc77c\uce58\uac00 \ubc1c\uc0dd\ud558\uba70, \uc704\ud5d8\uc774 \ud655\uc0b0\ub418\ub294 \uc774\uc720\ub97c \uc54c\uc544\ubcf4\uc138\uc694.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.rsa.com\/ko\/resources\/blog\/identity-governance-and-administration\/the-hidden-costs-of-manual-identity-governance\/","og_locale":"ko_KR","og_type":"article","og_title":"The Hidden Costs of Manual Identity Governance | RSA Blog","og_description":"Read the blog to see why manual identity governance and administration (IGA) processes slow operation, creates access inconsistencies, and spreads risks\u2014and learn how AI and automation can make IGA faster, smarter, and more effective.","og_url":"https:\/\/www.rsa.com\/ko\/resources\/blog\/identity-governance-and-administration\/the-hidden-costs-of-manual-identity-governance\/","og_site_name":"RSA","article_published_time":"2025-09-17T15:02:02+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/www.rsa.com\/wp-content\/uploads\/the-hidden-costs-of-manual-identity-governance-rsa-social.webp","type":"image\/webp"}],"author":"Ben Lebeaux","twitter_card":"summary_large_image","twitter_title":"The Hidden Costs of Manual Identity Governance | RSA Blog","twitter_description":"Read the blog to see why manual identity governance and administration (IGA) processes slow operation, creates access inconsistencies, and spreads risks\u2014and learn how AI and automation can make IGA faster, smarter, and more effective.","twitter_image":"https:\/\/www.rsa.com\/wp-content\/uploads\/the-hidden-costs-of-manual-identity-governance-rsa-social.webp","twitter_creator":"@bcomroe@logical-inc.com","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":["Article","BlogPosting"],"@id":"https:\/\/www.rsa.com\/id\/resources\/blog\/identity-governance-and-administration\/the-hidden-costs-of-manual-identity-governance\/#article","isPartOf":{"@id":"https:\/\/www.rsa.com\/id\/resources\/blog\/identity-governance-and-administration\/the-hidden-costs-of-manual-identity-governance\/"},"author":{"name":"Ben Lebeaux","@id":"https:\/\/www.rsa.com\/#\/schema\/person\/597f5b8f2d9eb8876c9be212f4dcdce9"},"headline":"The Hidden Costs of Manual Identity Governance","datePublished":"2025-09-17T15:02:02+00:00","mainEntityOfPage":{"@id":"https:\/\/www.rsa.com\/id\/resources\/blog\/identity-governance-and-administration\/the-hidden-costs-of-manual-identity-governance\/"},"wordCount":7,"publisher":{"@id":"https:\/\/www.rsa.com\/#organization"},"image":{"@id":"https:\/\/www.rsa.com\/id\/resources\/blog\/identity-governance-and-administration\/the-hidden-costs-of-manual-identity-governance\/#primaryimage"},"thumbnailUrl":"https:\/\/www.rsa.com\/wp-content\/uploads\/the-hidden-costs-of-manual-identity-governance-rsa-blog.webp","articleSection":["Identity Governance &amp; Administration"],"inLanguage":"ko-KR"},{"@type":"WebPage","@id":"https:\/\/www.rsa.com\/id\/resources\/blog\/identity-governance-and-administration\/the-hidden-costs-of-manual-identity-governance\/","url":"https:\/\/www.rsa.com\/id\/resources\/blog\/identity-governance-and-administration\/the-hidden-costs-of-manual-identity-governance\/","name":"\uc218\ub3d9 ID \uac70\ubc84\ub10c\uc2a4\uc758 \uc228\uaca8\uc9c4 \ube44\uc6a9 - RSA","isPartOf":{"@id":"https:\/\/www.rsa.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.rsa.com\/id\/resources\/blog\/identity-governance-and-administration\/the-hidden-costs-of-manual-identity-governance\/#primaryimage"},"image":{"@id":"https:\/\/www.rsa.com\/id\/resources\/blog\/identity-governance-and-administration\/the-hidden-costs-of-manual-identity-governance\/#primaryimage"},"thumbnailUrl":"https:\/\/www.rsa.com\/wp-content\/uploads\/the-hidden-costs-of-manual-identity-governance-rsa-blog.webp","datePublished":"2025-09-17T15:02:02+00:00","description":"\uc218\ub3d9 IGA(ID \uac70\ubc84\ub10c\uc2a4 \ubc0f \uad00\ub9ac)\ub85c \uc778\ud574 \uc6b4\uc601 \uc18d\ub3c4\uac00 \ub290\ub824\uc9c0\uace0, \uc561\uc138\uc2a4 \ubd88\uc77c\uce58\uac00 \ubc1c\uc0dd\ud558\uba70, \uc704\ud5d8\uc774 \ud655\uc0b0\ub418\ub294 \uc774\uc720\ub97c \uc54c\uc544\ubcf4\uc138\uc694.","breadcrumb":{"@id":"https:\/\/www.rsa.com\/id\/resources\/blog\/identity-governance-and-administration\/the-hidden-costs-of-manual-identity-governance\/#breadcrumb"},"inLanguage":"ko-KR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.rsa.com\/id\/resources\/blog\/identity-governance-and-administration\/the-hidden-costs-of-manual-identity-governance\/"]}]},{"@type":"ImageObject","inLanguage":"ko-KR","@id":"https:\/\/www.rsa.com\/id\/resources\/blog\/identity-governance-and-administration\/the-hidden-costs-of-manual-identity-governance\/#primaryimage","url":"https:\/\/www.rsa.com\/wp-content\/uploads\/the-hidden-costs-of-manual-identity-governance-rsa-blog.webp","contentUrl":"https:\/\/www.rsa.com\/wp-content\/uploads\/the-hidden-costs-of-manual-identity-governance-rsa-blog.webp","width":1200,"height":630,"caption":"The Hidden Costs of Manual Identity Governance"},{"@type":"BreadcrumbList","@id":"https:\/\/www.rsa.com\/id\/resources\/blog\/identity-governance-and-administration\/the-hidden-costs-of-manual-identity-governance\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.rsa.com\/"},{"@type":"ListItem","position":2,"name":"The Hidden Costs of Manual Identity Governance"}]},{"@type":"WebSite","@id":"https:\/\/www.rsa.com\/#website","url":"https:\/\/www.rsa.com\/","name":"RSA","description":"\uc0ac\uc774\ubc84 \ubcf4\uc548 \ubc0f \ub514\uc9c0\ud138 \ub9ac\uc2a4\ud06c \uad00\ub9ac \uc194\ub8e8\uc158","publisher":{"@id":"https:\/\/www.rsa.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.rsa.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ko-KR"},{"@type":"Organization","@id":"https:\/\/www.rsa.com\/#organization","name":"RSA","url":"https:\/\/www.rsa.com\/","logo":{"@type":"ImageObject","inLanguage":"ko-KR","@id":"https:\/\/www.rsa.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.rsa.com\/wp-content\/uploads\/rsa.png","contentUrl":"https:\/\/www.rsa.com\/wp-content\/uploads\/rsa.png","width":2880,"height":1020,"caption":"RSA"},"image":{"@id":"https:\/\/www.rsa.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.rsa.com\/#\/schema\/person\/597f5b8f2d9eb8876c9be212f4dcdce9","name":"\ubca4 \ub974\ubcf4","sameAs":["https:\/\/x.com\/bcomroe@logical-inc.com"]}]}},"_links":{"self":[{"href":"https:\/\/www.rsa.com\/ko\/wp-json\/wp\/v2\/posts\/35075","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.rsa.com\/ko\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.rsa.com\/ko\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.rsa.com\/ko\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/www.rsa.com\/ko\/wp-json\/wp\/v2\/comments?post=35075"}],"version-history":[{"count":3,"href":"https:\/\/www.rsa.com\/ko\/wp-json\/wp\/v2\/posts\/35075\/revisions"}],"predecessor-version":[{"id":35083,"href":"https:\/\/www.rsa.com\/ko\/wp-json\/wp\/v2\/posts\/35075\/revisions\/35083"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.rsa.com\/ko\/wp-json\/wp\/v2\/media\/35078"}],"wp:attachment":[{"href":"https:\/\/www.rsa.com\/ko\/wp-json\/wp\/v2\/media?parent=35075"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.rsa.com\/ko\/wp-json\/wp\/v2\/categories?post=35075"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.rsa.com\/ko\/wp-json\/wp\/v2\/tags?post=35075"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}