Skip to end of banner
Go to start of banner

General IAM-CMM

Skip to end of metadata
Go to start of metadata

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 27 Current »

The General IAM-CMM

Description

The objective of the General IAM-CMM is to provide a high-level capability maturity model to assess global IAM programs within organizations. In general, practices that are specific to one IAM domain (e.g.: Workforce IAM, PAM/TAM, CIAM, etc.) are should be excluded from this CMM and included in domain-specific CMMs.

CMM

Process Area

Practice

Level 1

Initial

Level 2

Repeatable

Level 3

Defined

Level 4

Managed

Level 5

Optimizing

Account Lifecycle Management

Orphan Accounts Cleaning

The identification and cleaning of orphan accounts is ad hoc. Accountability for the process is not clearly established and resources are not provided by the organization. The presence of orphan accounts is largely unknown.

The organization provides resources for the process. Correlation of accounts is performed but its scope is not clearly defined. Some orphan accounts are regularly identified and remediated.

Procedures define requirements applicable to the prevention, identification and remediation of orphan accounts.

Roles and responsibilities for this process are clearly established. Typical actors include IT owners, business owners, system administrators, provisioning teams, and information security.

The scope and methods used for account correlation are clearly defined. If portions of the information system are not covered by the process or infrequently covered, this is documented and related risks are accepted.

Account naming conventions are authorized, documented, and maintained.

Accounts non-compliant with the authorized naming conventions are remediated.

Golden sources for identity correlation are defined.

The discovery and correlation of accounts is preferably automated when technically feasible. When technically unfeasible, the discovery and correlation of accounts is performed manually.

The presence of uncorrelated accounts is quantified.

The coverage of the correlation process is quantified.

The delay between uncorrelated account identification and remediation is quantified.

Independant audits review both the presence of orphan accounts and the overall process.

The root causes of the presence of orphan accounts in the information system are analyzed and used to further prevent their occurence.

  • No labels