Companies providing digital services need to secure access to information to protect data that belongs to the organization, its customers and its business partners. Mitigations such as asking a third-party company to run penetration tests can help.
This provides you with powerful options for https://thenewstack.io/how-do-authentication-and-authorization-differ/ users, protecting data using tokens and interoperating with business partners.
If some values are stored in the business data, the IAM system must be able to retrieve them.
Your business data will often have its own user concept, with business user IDs stored against business resources.