Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Responsibilities

Responsibility

Category

Assure that only the right people or entities have the right access at the right time to enable the organization to securely reach its goals

Status
titleGovernance

Assess existing IAM capabilities, develop a risk-based IAM strategic roadmap aligned with the organization's goals and obtain top management sponsorship for it

Status
titleGovernance

Embrace Identity and Access Management holistically including Workforce IAM, 3rd Party IAM, Client IAM, Object IAM, Technical IAM or PAM and Physical Access

Status
titleGovernance

Assure that the IAM function and program are supervised by adequate governing bodies

Status
titleGovernance

Design and implement IAM policies that establishes clear requirements and accountability for IAM topics

Status
titleGovernance

Develop an IAM technological roadmap to sustain the organization's digital transformation

Status
titleGovernance

Find, recruit, train and develop IAM talents

Status
titleGovernance

Design and implement an authorization process that assure the legitimacy and appropriateness of access permissions

Status
titleGovernance

Assure coverage of IAM processes over the information system by dynamically integrating IT Asset Management inventories

Status
colourBlue
titleIdentify

Identify and analyze IAM related risks in alignment with the organization's risk management framework

Status
colourBlue
titleIdentify

Conduct regulatory and industrial watch to identify regulatory, contractual and industrial requirements and best practices

Status
colourBlue
titleIdentify

Facilitate and provide evidences for internal and external audits on IAM related topics and manage related findings and recommendations

Status
colourBlue
titleIdentify

Embed IAM requirements by design in the SDLC, Project, and Change Management processes

Status
colourBlue
titleIdentify

Assure adequate traceability in IAM processes to fullfill compliance and security requirements

Status
colourBlue
titleIdentify

Reconciliate systems with authorizations to identify and act upon anomalous identities and accesses

Status
colourBlue
titleIdentify

Use data analytics to identify and respond to anomalous identities, accesses, and behaviors

Status
colourBlue
titleIdentify

Effectively implement IAM remediation plans to mitigate IAM related risks

Status
colourPurple
titleProtect

Assure identity proofing and XXX

Status
colourPurple
titleProtect

Implement roled-based and other access control models to assure least privilege

Status
colourPurple
titleProtect

Design, implement, and execute IAM controls to efficiently and effectively assure compliance with regulatory, contractual and industrial best practice requirements

Status
colourPurple
titleProtect

Home office and remote access

Status
colourPurple
titleProtect

Privileged and technical access management

Status
colourPurple
titleProtect

Off-boarding and security

Status
colourPurple
titleProtect

Mitigate fraud and accidents by deploying SoD and toxic rights controls

Status
colourPurple
titleProtect

Deploy authentication mechanisms whose robustness is commensurate with risk

Status
colourPurple
titleProtect

Clean the information system from orphaned accounts

Status
colourPurple
titleProtect

Recertification

Status
colourPurple
titleProtect

Remediate anomalous identities and accesses

Status
colourPurple
titleProtect

Define and implement a password and secrets management policy

Status
colourPurple
titleProtect