- Identity and access management (IAM) is the foundation of all usability within the environment and needs to be well defined and documented. Every organization has users, and every user needs access.
- Organizations have watched their systems become more entangled as more processes are moved to the cloud and more security threats present themselves.
- Auditing a long list of users is a tedious task that nobody wants to do. Unclassified data exacerbates the problem.
Our Advice
Critical Insight
- Role-based access control (RBAC) doesn’t have to be hard.
Document the information that people inherently know. Having a strong repository of permission-role and user-role assignments is key to ensuring that the RBAC process lives on and remains effective despite changes within the organization. - Focus on permission and role engineering.
Managing identity and access starts with identifying and classifying what requires access, taking into account where it exists and identifying who needs access to it. This first process is termed permission engineering. The latter part is termed role engineering. While not covered in this research, it will be explored in future iterations. - The primary goal should be to minimize privilege creep.
RBAC improves the efficiency of managing IAM by reducing the amount of privilege creep that exists among the users of the organization. When roles are designed, the principle of least privilege is employed, and therefore users are granted only the roles, and consequently permissions, required to do their job.
Impact and Result
- Our research will lay the groundwork for establishing a centralized, effective, and efficient system for managing identity and access. We will help organizations take back control of their IAM environment by creating and implementing a RBAC model.
- Working with the tools associated with this research will help create a repeatable, simplified auditing process and minimize the amount of entitlement sprawl.
- This research will educate readers on selecting and implementing IAM vendors and will assist in producing vendor RFPs and shortlisting vendors to help ensure that selected vendor solutions offer capabilities required by the organization (e.g. multi-factor authentication) based on business goals, compliance, and other gaps, and will offer integration functionality with the different cloud vendors (e.g. SaaS) used by the organization.
Member Testimonials
After each Info-Tech experience, we ask our members to quantify the real-time savings, monetary impact, and project improvements our research helped them achieve. See our top member experiences for this blueprint and what our clients have to say.
9.7/10
Overall Impact
$6,434
Average $ Saved
8
Average Days Saved
Client
Experience
Impact
$ Saved
Days Saved
Atlas Iron Pty Ltd
Guided Implementation
10/10
N/A
N/A
Early engagement and kick-off meeting, but found Carlos extremely knowledgeable and engaging. Look forward to seeing the progress with the team
Worldnet International
Guided Implementation
10/10
$13,700
20
Lee County Clerk of Courts
Guided Implementation
10/10
N/A
10
Carlos was very knowledgeable. He provided valuable insights and documentation that will certainly save us time on our IAM project.
Canopy Growth
Guided Implementation
10/10
N/A
N/A
Carlos clearly understood the complex issues we face and offered some great advice and suggestions on where to start, with potential tools that mig... Read More
Guidehouse LLP
Guided Implementation
9/10
$2,603
1
LivingWorks Education Inc
Guided Implementation
9/10
$3,000
2
Great knowledgeable resources and tools that we can use to help identify potential CIAM solutions for our own use.