IMPLEMENTING IDENTITY ACCESS MANAGEMENT

 

IMPLEMENTING IDENTITY ACCESS MANAGEMENT

IAM program comprises a technology solution interwoven with relevant business processes, to manage the identity of users and their access to systems and applications in the organizations. To unlock true business value, one needs to tie in business processes at the time of conception of the IAM program itself. Successful IAM program implementation requires a solid foundation and it includes evaluation of the completeness of the IAM product’s capability portfolio. To simplify the management of IAM implementation program, it should include proper mix of SDLC phases with implementation of multiple proofs of concepts to arrive at the overall feasibility of IAM solution. Different user communities necessitate education on different aspects of the solutions. Business SMEs should also be educated on product capability offerings so that the right mix of manual and automated processes can result in more business efficiency. Organizations must adopt formal policies and procedures to address account provisioning, review and revocation. Physical security manages and protect resources in the form of administrative, technical and physical controls. The lesson concludes with a discussion on the implementing IAM through various practices to succeeds and achieve its intended objectives.

 

 

Keywords:

SOA                       -              Service-Oriented Architecture

SME                       -              Small and Medium Enterprises

IDS                         -              Intrusion Detection System

CAPEX                   -              Capital Expenditures

OPEX                     -              Operating Expenses



Comments