Managing the identities and access to key resources is a critical IT function. Review these slides to learn about the challenges you may face in achieving continuous compliance, efficiency and reduced risk and the steps you can take to help ensure a successful Identity Management implementation.
Presenter: vansr01
Hi Chris-
Great feedback. Good examples of best practices as mentioned in the presentation are 1) Role mining not done as part of IDM implementation. Here's some more pointers to that: http://www.ca.com/us/services/implement/~/media/Files/whitepapers/role-engineering-the-cornerstone-of-role-based-access
Reducing compliance costs with birthright roles
2) Limiting automation to few life-cycle events, in particular not automating transfers because of current business processes cannot be re engineered. Please review the
blog on the same topic where there's more discussion on these items.
How to avoid identity management project pitfalls - Highlight
vansr01 aubge01 - Please see Chris' question above.
Excellent presentation, which certainly hit on a few difficult pain points projects continually face.
Do you have anymore suggestions on how to help both technical, and stakeholders, to utilize more of the best practices you've put forth in this presentation?
For example, perhaps some business justification for any particular reason not being followed or partially followed; why it should be fixed, and what are the specific risks of not fixing it, or if risks can be mitigated in other ways.
Thanks,
Chris.
Webcast replay: Top Reasons Why Identity Management Projects Fail & How to Avoid Them