IMPLEMENTING
IDENTITY ACCESS MANAGEMENT
IAM program comprises a technology solution interwoven with
relevant business processes, to manage the identity of users and their access
to systems and applications in the organizations. To unlock true business
value, one needs to tie in business processes at the time of conception of the
IAM program itself. Successful IAM program implementation requires a solid foundation
and it includes evaluation of the completeness of the IAM product’s capability
portfolio. To simplify the management of IAM implementation program, it should
include proper mix of SDLC phases with implementation of multiple proofs of
concepts to arrive at the overall feasibility of IAM solution. Different user
communities necessitate education on different aspects of the solutions.
Business SMEs should also be educated on product capability offerings so that
the right mix of manual and automated processes can result in more business
efficiency. Organizations must adopt formal policies and procedures to address
account provisioning, review and revocation. Physical security manages and
protect resources in the form of administrative, technical and physical
controls. The lesson concludes with a discussion on the implementing IAM
through various practices to succeeds and achieve its intended objectives.
Keywords:
SOA - Service-Oriented Architecture
SME - Small and Medium Enterprises
IDS - Intrusion Detection System
CAPEX - Capital Expenditures
OPEX - Operating Expenses
Comments
Post a Comment