Assess and Govern Identity Security

Strong identity security and governance are the keys to the zero-trust future.

RETIRED CONTENT

Please note that the content on this page is retired. This content is not maintained and may contain information or links that are out of date.

Improving identity security can be challenging:

  • For most organizations, identity and access management has been allowed to grow organically, and it has become inflexible and difficult to control.
  • In most cases, the number of identities and the items they access has increased with each passing year, necessitating more scalable processes and technology.

Info-Tech has developed an effective approach to building an identity security architecture. This unique approach includes tools for:

  • Establishing governance for identity security.
  • Creating an identity inventory.
  • Modeling identity-based threats.
  • Building an identity security architecture.

Book Your Workshop

Onsite Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn’t enough, we offer low-cost onsite delivery of our Project Workshops. We take you through every phase of your project and ensure that you have a road map in place to complete your project successfully.

Module 1: Establish Identity Governance

The Purpose

Establish identity governance.

Key Benefits Achieved

Improved identity governance

Activities: Outputs:
1.1 Adopt a standard identity taxonomy.
  • Identity taxonomy
1.2 Identify the tasks for your identity security project.
1.3 Allocate responsibility and ownership for each task in a RACI chart.
  • Identity security RACI chart
1.4 Analyze your RACI chart.

Module 2: Assess and Mitigate Identity Threats

The Purpose

Assess and mitigate identity threats.

Key Benefits Achieved

Assessed identity threats

Activities: Outputs:
2.1 Document identity repositories.
2.2 Inventory your identity types.
  • Identity inventory
2.3 Review and assess identity-based MITRE ATT&CK® threats.
2.4 Review and assess identity-based MITRE ATT&CK® mitigations.
  • Identity-based threat and mitigation assessment using the MITRE ATT&CK® framework
  • Identity security architecture with prioritized controls
Visit our Exponential IT Research Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019