We live in an increasingly connected and remote world. The issue of identity, and its inherent connection to security, is more important than ever. Identity-related breaches have become ubiquitous in the last 2 years [READ THE REPORT]. A lack of Identity and Access Management (IAM) maturity, an over-abundance of complex security technologies and confusion over…
Archives
-
IAM Best Practices Blog Series: Making IAM an Integral Part of Application Onboarding and Major Changes
In previous IAM Best Practices blogs my fellow customer advisory board members have discussed identity ownership, ensuring identity uniqueness, where to start with provisioning and de-provisioning and discovery of assets for privileged access. Now that you have a solid foundation for your IAM program, it’s time to move on to establishing processes for incorporating IAM into new applications. Application onboarding…
-
IAM Best Practices Blog Series: Asset Discovery is an Essential Step for Privileged Access Management
In a digitally-driven business world, today’s infrastructure, applications and networks are spread across on-premise and in the cloud environments, with mobile and virtual elements. With such a dynamic set of circumstances, identifying and safeguarding critical “crown jewel” assets and their access becomes a key risk mitigating control to proactively address security risks. A first step…
-
IAM Best Practices Blog Series: Align Automated Provisioning and De-provisioning with Business Priorities, But Focus on Risk
Provisioning access for new employees can be a time-consuming exercise without the proper processes and tools in place. Even more challenging and important is de-provisioning user access when roles change, or people leave the organization. In the last IAM Best Practices blog, Tom Malta discussed the value in establishing and maintaining unique identities and its importance in establishing…