...
...
...
...
...
...
...
...
...
...
Mission
Assure that only the right people and entities have the right access at the right time to enable the organization to securely reach its goals.
Goals
See IAM Goals.
Responsibilities
ID | Responsibility | Domain | Category | ||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Assess existing IAM capabilities, define a vision and develop a risk-based IAM strategic roadmap aligned with the organization's goals and obtain top management sponsorship for it R01 | Identify key IAM stakeholders including but not limited to: Top Management, IT, Security, Compliance, Business Lines, HR, Procurement. | All |
| ||||||||||
R02 | Embrace Identity and Access Management holistically including all IAM domains: Workforce IAM, 3rd Party IAM, Client IAM, Object IAM, Technical IAM or PAM and Physical Access. | All |
| ||||||||||
R03 | Collect and prioritize IAM requirements from the key IAM stakeholders. | All |
| ||||||||||
R04 | Assess existing IAM capabilities, define a vision and develop a risk-based IAM strategic roadmap aligned with the organization's goals and obtain top management sponsorship for it. This implies coordination with the key IAM stakeholders. | All |
| ||||||||||
R05 | Assure that the IAM function and program are supervised by and report to adequate governing bodies. | All |
| ||||||||||
R06 | Demonstrate leadership to execute the IAM strategic roadmap and co-create value with the organization. | All |
| ||||||||||
R07 | Maintain contact and exchange information with relevant authorities, special interest groups, and peers. | All |
| ||||||||||
R08 | Design and implement IAM policies that establishes clear requirements and accountability across all IAM domains | All |
| ||||||||||
R09 | Develop an IAM technological roadmap to sustain the organization's digital transformation | All |
| ||||||||||
R10 | Find, recruit, retain, train, and develop IAM talents | All |
| ||||||||||
R11 | Assure up-to-date quality documentation is maintained in IAM records, processes, systems, and their architecture. | All |
| ||||||||||
R12 | Design and implement authorization processes that assure the legitimacy and appropriateness of access permissions | All |
| ||||||||||
R13 | Assure coverage of IAM processes over the information system by dynamically integrating IT Asset Management inventories | All |
| ||||||||||
R14 | Identify and analyze IAM related risks in alignment with the organization's risk management framework | All |
| ||||||||||
R15 | Conduct regulatory and industrial watch to identify regulatory, contractual and industrial requirements and best practices | All |
| ||||||||||
R16 | Facilitate and provide evidences for internal and external audits on IAM related topics and manage related findings and recommendations | All |
| ||||||||||
R17 | Embed IAM requirements by design in the SDLC, Project, and Change Management processes | All |
| ||||||||||
R18 | Effectively implement remediation plans to mitigate IAM related risks and remediate findings | All |
| ||||||||||
R19 | Implement and maintain role-based and other access control models in consistency with the organizational structure and due respect for the least privilege and its specialized form the need-to-know principles | All |
| ||||||||||
R20 | Design, implement, operate, and continuously improve IAM controls to efficiently and effectively assure compliance with regulatory, contractual and industrial best practice security requirements | All |
| ||||||||||
R21 | Design, implement, and continuously improve privileged and technical access management processes and capabilities to effectively mitigate high privileged access risks | PAM/TAM |
| ||||||||||
R22 | Mitigate fraud and accidents by deploying SoD and toxic rights controls | All |
| ||||||||||
R23 | Deploy authentication mechanisms whose robustness is commensurate with risk | All |
| ||||||||||
R24 | Clean the information system from anomalous identities, including orphaned accounts, and access permissions | All |
| ||||||||||
R25 | Implement an efficient off-boarding process that effectively mitigates the risk of unauthorized access by former employees | Workforce IAM |
| ||||||||||
R26 |
| 3rd Party IAM |
| ||||||||||
R27 |
| Workforce IAM |
| ||||||||||
R28 |
| Workforce IAM, 3rd Party IAM, PAM/TAM |
| ||||||||||
R29 |
| All |
| ||||||||||
R30 |
| All |
| ||||||||||
R31 | Reconciliate systems with authorizations to identify and act upon anomalous identities and accesses | All |
| ||||||||||
R32 | Assure adequate traceability in IAM processes to fullfill compliance and security requirements | All |
| ||||||||||
R33 | In coordination with Security Operations, deploy, maintain, and continuously improve monitoring and analytics capabilities to detect anomalous authentication and accesses to deter unauthorized accesses | All |
| ||||||||||
R34 | Use data analytics to identify and respond to anomalous identities, accesses, and behaviors | All |
| ||||||||||
R35 | In coordination with the CSIRT / Incident Response Team, continuously prepare and improve IAM response capabilities (including SOPs) to effectively contain, and eradicate contribute to the containment and eradication of security incidents when they occur | All |
| ||||||||||
R36 | Suspend anomalous identities and revoke their accesses in response to security incidents in liaison with the CSIRT / Incident Response TeamInvestigate | All |
| ||||||||||
R37 | Based on reconciliation, investigate the root causes of identity and access anomalies Contingency planning to recover from large scale incidents?and initiate remediation plans accordingly | All |
| ||||||||||
R38 | Contribute to contingency planning by leveraging IAM capabilities for the recovery of large scale incidents or disaster | All |
| Enhance workforce productivity with efficient staff on-boarding and transfer processes | Leverage the IAM function as an accelerator for |