Weak identity and access management (IAM) practices result in considerable risk to the organization because IAM plays a role in most things in IT.
Common reasons behind weak IAM practices include:
- There is no central ownership of IAM. Owners of IAM actions outside of IT (e.g. provisioning an account in an HRIS) may be resistant to adopting change.
- IAM processes are ad hoc and reactionary. Organizations do not have a high-level understanding of how identities and access are managed at the organization.
- The organization lacks technology to better manage their defined IAM processes. IAM software remains expensive and is often implemented before the people and processes to support that technology have been identified.
Our Advice
Critical Insight
To have a successful identity and access management program, you must first identify who will be the owner(s). Then, in collaboration with the owner(s), create processes that support the organization’s goals. Lastly, consider how technology can assist in enabling or automating defined processes.
Impact and Result
Info-Tech provides a high-level framework that helps organizations ensure they are following best practice at all stages of an identity's lifecycle.
- Identify the drivers behind improving your IAM practices.
- Develop best practice processes for each section of the identity lifecycle.
- Understand the benefits of using IAM software.
Use our research to start your journey to mature the IAM program at your organization.
Member Testimonials
After each Info-Tech experience, we ask our members to quantify the real-time savings, monetary impact, and project improvements our research helped them achieve. See our top member experiences for this blueprint and what our clients have to say.
9.1/10
Overall Impact
$14,305
Average $ Saved
9
Average Days Saved
Client
Experience
Impact
$ Saved
Days Saved
Kappa Delta Sorority
Guided Implementation
10/10
$6,499
20
Victor's attention to detail and guiding me through each area of the process was much appreciated since this is not my area of expertise. I appreci... Read More
Federated Co-operatives Limited
Guided Implementation
10/10
N/A
10
Best part is it made us take time and focus. The tool made it easy to keep in track, work through it logically and break it apparent as to what th... Read More
San Diego County Office of Education
Guided Implementation
8/10
$12,999
10
I understand you do not provide the technology side to this conversation which is a big piece of this project. However, that being said, It was he... Read More
College of Westchester
Guided Implementation
9/10
$61,749
20
Victor has been a huge help and saved us a lot of time and effort!
Sycuan Casino
Guided Implementation
10/10
$6,499
16
Petar took the time to explain each line item in detail during our guided implementation. This guide definitely has already increased my companies ... Read More
Simcoe Muskoka Catholic District School Board
Guided Implementation
10/10
$2,000
5
I like the timely advice I received.
Spartan Controls Ltd.
Guided Implementation
10/10
$25,000
5
Appreciated the advise and experience provided. Also helped validate my current direction.
High Liner Foods Incorporated
Guided Implementation
8/10
$10,000
2
Renown Health
Guided Implementation
8/10
N/A
3
Ian is very knowledgeable in the IAM space and provided some best practices in this area.
Joe Hudson's Collision Center
Guided Implementation
9/10
$2,000
2
We did a poor job of delivering requirements ahead of time. The presenter recovered nicely.
Federated Co-operatives Limited
Guided Implementation
8/10
$2,000
1
Workshop: Mature Your Identity and Access Management Program
Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.
Module 1: Assess Identity and Access Requirements
The Purpose
- Understand the drivers, goals, and scope of the IAM improvement project.
- Explore the IAM challenges and risks that exist for the organization.
Key Benefits Achieved
- A list of goals for improving the organization’s IAM practices, based on the existing drivers and defined project scope.
- A list of the IAM challenges that the organization faces.
- A list of the inherent IAM risks because of the organization’s IAM challenge, and the risks that exist due to current IAM practices.
Activities
Outputs
Define the goals and scope of the IAM improvement initiative.
- List of IAM drivers and goals.
Identify the IAM challenges and risks that exist for the organization.
- List of IAM challenges and risks.
Module 2: Identify Initiatives Using the Identity Lifecycle
The Purpose
- Identity areas of weakness within existing IAM practices and create improvement initiatives.
Key Benefits Achieved
- A better understanding of the strengths and weaknesses of the organization’s current IAM practices.
- A list of initiatives for improving the organization’s IAM practices.
Activities
Outputs
Investigate current and desired onboarding practices.
- IAM current and future state assessments for onboarding practices.
Investigate current and desired authentication practices.
- IAM current and future state assessments for authentication practices.
Investigate current and desired authorization practices.
- IAM current and future state assessments for authorization practices.
Investigate current and desired identity and access auditing practices.
- IAM current and future state assessments for identity and access auditing practices.
Investigate current and desired offboarding practices.
- IAM current and future state assessments for offboarding practices.
Module 3: Prioritize Initiatives and Build a Roadmap
The Purpose
Prioritize initiatives for improving IAM practices at the organization and incorporate them into a roadmap.
Key Benefits Achieved
The development of a roadmap for improving Identity and Access Management at the organization.
Activities
Outputs
Conduct cost/benefit analysis on initiatives.
Prioritize gap initiatives based on cost, time, and alignment with the business.
Build an effort map.
Determine initiative start times and accountability.
Finalize IAM roadmap and action plan.
- Roadmap for IAM program improvement.