Assess and Govern Identity Security

Strong identity security and governance are the keys to the zero-trust future.

Book This Workshop

Improving identity security can be challenging:

  • For most organizations, identity and access management has been allowed to grow organically, and it has become inflexible and difficult to control.
  • In most cases, the number of identities and the items they access has increased with each passing year, necessitating more scalable processes and technology.

Info-Tech has developed an effective approach to building an identity security architecture. This unique approach includes tools for:

  • Establishing governance for identity security.
  • Creating an identity inventory.
  • Modeling identity-based threats.
  • Building an identity security architecture.

Book Your Workshop

Onsite Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn’t enough, we offer low-cost onsite delivery of our Project Workshops. We take you through every phase of your project and ensure that you have a road map in place to complete your project successfully.

Book Now

Module 1: Establish Identity Governance

The Purpose

Establish identity governance.

Key Benefits Achieved

Improved identity governance

Activities: Outputs:
1.1 Adopt a standard identity taxonomy.
  • Identity taxonomy
1.2 Identify the tasks for your identity security project.
1.3 Allocate responsibility and ownership for each task in a RACI chart.
  • Identity security RACI chart
1.4 Analyze your RACI chart.

Module 2: Assess and Mitigate Identity Threats

The Purpose

Assess and mitigate identity threats.

Key Benefits Achieved

Assessed identity threats

Activities: Outputs:
2.1 Document identity repositories.
2.2 Inventory your identity types.
  • Identity inventory
2.3 Review and assess identity-based MITRE ATT&CK® threats.
2.4 Review and assess identity-based MITRE ATT&CK® mitigations.
  • Identity-based threat and mitigation assessment using the MITRE ATT&CK® framework
  • Identity security architecture with prioritized controls
Visit our IT Cost Optimization Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019