Identity and Access Governance (IAG)

Selection and Implementation Guide

This guide is meant to help cyber security professionals in organizations with less than 500 users select and implement IAG quickly to build resilience. It provides a good starting point for the Cyber Resilience community in the road to govern identity and access capabilities for people, processes and technologies in the organization.

This document is available to Premium and Enterprise members of the Cyber Leadership Institute. Click on the “Subscribe Now” button below to subscribe for Premium or Enterprise Membership and get access to this guide.

If you're already a member, click here to log in

  • Identity and Access Governance Overview
  • Benefits of Identity Access & Governance
  • Leading IAG Vendors
  • Common Requirements of IAG
  • Recommended Selection Criteria
  • Overview of Typical IAG Implementation Project
  • Rapid IAG Implementation
  • Key Challenges Facing IAG Selection & Implementation
  • Tips & Tricks - Why IAG Projects Fail