Our systems detected an issue with your IP. If you think this is an error please submit your concerns via our contact form.

Security icon

Assess and Govern Identity Security

Strong identity security and governance are the keys to the zero-trust future.

  • Many security leaders are struggling to meet the recommendations of internal and external parties when it comes to identity and access management.
  • A lot of identity and access management processes are known to be inefficient, and many known solutions are difficult to implement.

Our Advice

Critical Insight

  • Building an identity security architecture is a high-value initiative that will drive the modernization of identity security.

Impact and Result

  • Develop a common terminology and understanding of identity concepts.
  • Identify the roles and responsibilities within your organization for the governance of identity security.
  • Inventory your identity types, repositories, threats, and mitigations.
  • Develop an identity security architecture to understand and mitigate weaknesses.

Assess and Govern Identity Security Research & Tools

1. Assess and Govern Identity Security Deck – A step-by-step document that walks you through how to properly inventory your identity types, repositories, threats, and mitigations.

Use this storyboard to learn how to assign identity security roles and responsibilities, inventory your identity types and repositories, assess your identity security threats and mitigations, and build an identity security architecture.

2. Identity Security RACI Chart – A best-of-breed template to help you document roles and responsibilities related to identity security.

Use this tool to document your roles and responsibilities related to identity security.

3. Identity Security Architecture Tool – A structured tool to help you inventory identity types, threats, and mitigations using the MITRE ATT&CK® framework.

Use this tool to:

  • Inventory your identity types and repositories.
  • Assess your identity security threats and mitigations using the MITRE ATT&CK® framework.
  • Build an identity security architecture.

Member Testimonials

After each Info-Tech experience, we ask our members to quantify the real-time savings, monetary impact, and project improvements our research helped them achieve. See our top member experiences for this blueprint and what our clients have to say.

9.0/10


Overall Impact

$8,220


Average $ Saved

4


Average Days Saved

Client

Experience

Impact

$ Saved

Days Saved

Lee County Clerk of Courts

Guided Implementation

9/10

$13,700

5

The analyst provided a good overview of the process and tools that Info-Tech recommends. I am planning on incorporating the tools into the discove... Read More

Menlo Park City School District

Guided Implementation

9/10

$2,740

2

I appreciate how Carlos listened to what we needed and advised on our thinking. We plan to reach out to him once we've developed our process further.


Strong identity security and governance are the keys to the zero-trust future.

About Info-Tech

Info-Tech Research Group is the world’s fastest-growing information technology research and advisory company, proudly serving over 30,000 IT professionals.

We produce unbiased and highly relevant research to help CIOs and IT leaders make strategic, timely, and well-informed decisions. We partner closely with IT teams to provide everything they need, from actionable tools to analyst guidance, ensuring they deliver measurable results for their organizations.

MEMBER RATING

9.0/10
Overall Impact

$8,220
Average $ Saved

4
Average Days Saved

After each Info-Tech experience, we ask our members to quantify the real-time savings, monetary impact, and project improvements our research helped them achieve.

Read what our members are saying

What Is a Blueprint?

A blueprint is designed to be a roadmap, containing a methodology and the tools and templates you need to solve your IT problems.

Each blueprint can be accompanied by a Guided Implementation that provides you access to our world-class analysts to help you get through the project.

Need Extra Help?
Speak With An Analyst

Get the help you need in this 2-phase advisory process. You'll receive 5 touchpoints with our researchers, all included in your membership.

Guided Implementation 1: Establish identity governance
  • Call 1: Scope requirements, objectives, and your specific challenges.
  • Call 2: Build an identity security RACI chart.

Guided Implementation 2: Assess and mitigate identity threats
  • Call 1: Identify and record existing identity types.
  • Call 2: Assess identity-based threats and mitigations.
  • Call 3: Create the identity security architecture.

Authors

Kate Wood

Ian Mulholland

Contributors

  • Brian Michell, Chief Information Officer, Effort Trust
  • Marc Mazur, Senior Consultant, KPMG
  • Mark Galloway, Associate Partner, IAMConcepts Security Solutions Inc.
  • Fabrizio Ienna, IAM Solutioning Project Manager, IAMConcepts Security Solutions Inc.
  • Don Davidson, Enterprise Security Architect, Canada Life
  • Luc Gagne, Senior Vice President, IAMConcepts Security Solutions Inc.
  • Eric Galis, VP Compliance and Security, Cengage
  • Keith Scarbeau, Cyber Security Architect, St. Luke's Health System Ltd.
  • Ron Pirau, Chief Information Officer, Archdiocese of Indianapolis
  • Sumit Jain, Chief Information Security Officer, Louisiana State University
  • Raj Sookha, Manager IT Architecture, Toronto Community Housing

Search Code: 98027
Last Revised: December 3, 2021

Visit our IT Crisis Response Resource Center
Over 100 analysts waiting to take your call right now: +1 (703) 340 1171