Assess and Govern Identity Security
Strong identity security and governance are the keys to the zero-trust future.
Book This WorkshopImproving identity security can be challenging:
- For most organizations, identity and access management has been allowed to grow organically, and it has become inflexible and difficult to control.
- In most cases, the number of identities and the items they access has increased with each passing year, necessitating more scalable processes and technology.
Info-Tech has developed an effective approach to building an identity security architecture. This unique approach includes tools for:
- Establishing governance for identity security.
- Creating an identity inventory.
- Modeling identity-based threats.
- Building an identity security architecture.
Book Your Workshop
Onsite Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn’t enough, we offer low-cost onsite delivery of our Project Workshops. We take you through every phase of your project and ensure that you have a road map in place to complete your project successfully.
Book NowModule 1: Establish Identity Governance
The Purpose
Establish identity governance.
Key Benefits Achieved
Improved identity governance
Activities: | Outputs: | |
---|---|---|
1.1 | Adopt a standard identity taxonomy. |
|
1.2 | Identify the tasks for your identity security project. |
|
1.3 | Allocate responsibility and ownership for each task in a RACI chart. |
|
1.4 | Analyze your RACI chart. |
|
Module 2: Assess and Mitigate Identity Threats
The Purpose
Assess and mitigate identity threats.
Key Benefits Achieved
Assessed identity threats
Activities: | Outputs: | |
---|---|---|
2.1 | Document identity repositories. |
|
2.2 | Inventory your identity types. |
|
2.3 | Review and assess identity-based MITRE ATT&CK® threats. |
|
2.4 | Review and assess identity-based MITRE ATT&CK® mitigations. |
|