Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Responsibility

Category

Assure that only the right people or entities have the right access at the right time to enable the organization to securely reach its goals

Status
titleGovernance

Assess existing IAM capabilities, develop a risk-based IAM strategic roadmap aligned with the organization's goals and obtain top management sponsorship for it

Status
titleGovernance

Embrace Identity and Access Management holistically including Workforce IAM, 3rd Party IAM, Client IAM, Object IAM, Technical IAM or PAM and Physical Access

Status
titleGovernance

Develop an IAM technological roadmap to sustain the organization's digital transformation

Status
titleGovernance

Find, recruit, train and develop IAM talents

Status
titleGovernance

Design and implement an authorization process that assure the legitimacy and appropriateness of access permissions

Status
titleGovernance

Assure coverage of IAM processes over the information system by dynamically integrating IT Asset Management inventories

Status
colourBlue
titleIdentify

Identify and analyze IAM related risks in alignment with the organization's risk management framework

Status
colourBlue
titleIdentify

Conduct regulatory and industrial watch to identify regulatory, contractual and industrial requirements and best practices

Status
colourBlue
titleIdentify

Facilitate and provide evidences for internal and external audits on IAM related topics and manage related findings and recommendations

Status
colourBlue
titleIdentify

Embed IAM requirements by design in the SDLC, Project, and Change Management processes

Status
colourBlue
titleIdentify

Assure adequate traceability in IAM processes to fullfill compliance and security requirements

Status
colourBlue
titleIdentify

Reconciliate systems with authorizations to identify and act upon anomalous identities and accesses

Status
colourBlue
titleIdentify

Use data analytics to identify and report respond to anomalous identities, accesses, and behaviors

Status
colourBlue
titleIdentify