Simplify Identity and Access Management
If you're already a member, click here to log in.
Major Business Pain Points

Recommendations
Key Points
Approach

Methodology and Tools
Executive Brief
Read the concise Executive Brief to find out why you should simplify identity and access management and review the methodology.
1. Audit and classify existing data
This phase will assist users with cleaning their current user directory and laying the foundations for implementing a more robust process for managing identities and access.
2. Implement a risk- and role-based access control model
This phase will guide readers through the process of creating and implementing a RBAC model. This includes the definition of metrics that can be used to refine future iterations of the RBAC model.
3. Create an RBAC maintenance plan
This phase covers best practices regarding exception handling and maintaining the RBAC system over time.
4. Consider an IAM vendor
This phase explores the selection and implementation of an IAM solution. Several tools are available to assist project owners with this typically challenging task.
All resources on this page are provided to Cyber Leadership Hub members under license from third parties including Info-Tech Research Group Inc, a global leader in providing IT research and advice.