Identity and Access Management has always been an ongoing process and an essential element of the enterprises’ infrastructure that demands continuous management. No matter you have completely implemented directory, it’s useful to take advantage of best practices to help continuously manage this crucial part of your IT environment.
When it comes to IAM implementations, PATECCO experts know what exactly works effectively and what not. For this article we have tapped the collective knowledge of these experts to come up with these eight IAM implementation tactics: They will help you improve your identity management system to ensure better security, efficiency and compliance.
#1. Create a clear pan
IAM projects require excellent planning and project management expertise, with a project team representing various stakeholders within the company. Most importantly, you need to have a business perspective and tie the phases of your IAM project to quantifiable business results and benefits. IAM solutions need regular care and feeding long after the initial go-live date, which means planning for followup optimizations is crucial.
#2. Implement IAM in phases
Implementing IAM in phases will definitely shorten the “time to value” of your project — the time before the business sees a distinct benefit — in the process giving you executive backing that will ensure the full funding of future phases.
#3. Define identities
Start implementing a single, integrated system that ensures end-to-end
management of employee identities and that retires orphaned identities at the appropriate time. This is where IT responsibility begins in the identity management lifecycle. You should also identify a primary directory service (often Active Directory) and a messaging system (such as Exchange Server).
#4. Implement workflow
Implementing workflow on the base of “request and approval” provides a secure way to manage and document change. A self-service web-based interface enables users to request permission to resources they need. It’s necessary to define who can control that list of services and who is responsible for managing workflow designs.
#5. Make provisioning automated
Manging new users, users who leave the organisation, and users who are promoted or demoted within the organisation require provisioning, de-provisioning and re-provisioning. Automating them will reduce errors and will improve consistency. Start first with automating the basic add/change/delete tasks for user accounts, and then integrate additional tasks such as unlocking accounts.
#6. Manage roles
You will need a certain amount of inventorying and mining to precisely identify the major roles within your organisation, based on the resource permissions currently in force. When the user places a request, the owner of the affected data has the ability to review, approve or deny the request. It is also important to define who will manage these roles and to ensure that roles are created, modified and deactivated by authorised individuals following the proper workflow.
#7. Become compliant
Many companies are now affected by the GDPR regulations, and your identity management system plays a beneficial role in remaining compliant. You should focus on clearly defining and documenting the job roles that have control over your data, as well as the job roles that should have access to auditing information. Determine compliance rules, and assign each step to a responsible job role.
#8. Provide knowledge and control to business owners
After the IAM system implementation, you should let business data owners manage access to their data and to provide central reporting and control over those permissions. For that purpose education is needed of both end users and the IT staff that will be charged with ongoing administration and operation.
For more info about PATECCO Best practices in IAM, check out here: