www.idenhaus.com
Identity & Access Management
Project Challenges and Recovery
August 2017
www.idenhaus.com
• Identity and Access Management
- Definition and Overview
• Business Drivers for IAM
• Project Challenges
• Success Factors
2
Identity & Access Management
Agenda
www.idenhaus.com
What is Identity & Access Management?
Access Management
The systems and processes that control who has access to IT
resources, and what each person is entitled to do with those
resources.
Identity Management
The systematic collection, maintenance, and distribution of
identity data to support business processes and systems.
3
www.idenhaus.com
Why Identity & Access Management?
Identity
Personalized
Content
Access
2. Provided to Resources
Based on Authenticated
Identity
1. Verify Who
3. Services Based on
Role or Preferences
4
www.idenhaus.com
Increasingly Complex Business Environments
Drive Need for IAM
Organizations need a “unifying framework” to organize accurate and timely information
about their employees, contractors, customers, partners—Identity is that framework
Complex Customer Interactions
• Multiple channels, products, services drive
need for single customer identity
Regulatory Requirements
• Demonstrate policy compliance, proper
controls, auditability
Security Concerns
• How to manage ”need to know”
• How to reduce risks of data exposure
• Growing internal & external threats
Information Quality
• Inconsistent, inaccurate, missing data
• Multiple sources, which is authoritative?
Extended Enterprise
• Manage contractors, partners, suppliers,
and customers
Improved
Service
Regulatory
Compliance
SecurityPrivacy
Business
Value
Scalability
5
5
www.idenhaus.com
… but your systems and processes look like this
6
www.idenhaus.com
Automation makes
a system of many
appear fewer.
7
www.idenhaus.com
AUTHORITATIVE
SOURCES
IDENTITY STORE
SERVICE
DIRECTORIES
CONSUMERS
Recruiting
Human Resources
(HRIS)
Contractors
Authentication
Services
Active Directory/Azure
Virtual Directory
Service
Saas
Applications
Proxy Servers
Identity Store
8
www.idenhaus.com
How IAM Solutions Work
Personnel #
Last Name
Phone
First Name
First Name
Personnel #
E-mail
Last Name
User Profile
Phone
Mail
Other Attributes ...
Authoritative Source
(SAP, Workday, Lawson)
First Name
Phone
UserID
UserID
Last Name
eMail
UserID
Email
Sync to
Consuming
Systems
Last Name
First Name
eMail
Identity Store Bobby on
Portal
Create Identity
& publish to
ID Store
Human Resources
003456
Bobby
Doe
404.555.5555
bdoe@domain.com
A12345
A12345
bdoe@domain.com
404.555.5555
Bobby
Doe
bdoe@domain.com
Bobby
003456
Doe
9
www.idenhaus.com
• Data Quality Issues
– Accuracy, Completeness, Availability, Latency, Consistency
• Broad Scope
– Internal users, external users, partners, suppliers, customers
• Business Processes Misalignment with IAM
– SLA
– Process vs. Technology
• Stakeholders Push Back
– Human Resources
– Asset Management
– Security
4 Common Challenges with Implementing IAM
10
www.idenhaus.com
• Who are you? What uniquely identifies you?
• What is your relationship to the organization?
• What is your role?
• Who do you manage?
• What assets do you have?
• How do we link:
– Bob Jones in system A, with
– Robert Jones in system B, with
– R Jones in system C?
IAM begins with accurate user data
11
www.idenhaus.com
Getting clean, consistent, and complete
data into the identity store is typical
hurdle for any IAM implementation.
Bottom line: establishing data quality &
accuracy can be a major factor in creating
a functional provisioning solution.
Sample of types of data needed
for Identity Store:
…first name, middle name, last name,
cost center, location, work status,
telephone number, supervisor/manager,
user class (employee, contractor),
expiration date (contractors),
business/functional role.
Data quality is a typical challenge
12
www.idenhaus.com
How big is too big?
• User Types (employee,
contractor, partner, etc.)
• Downstream systems (AD, ERP,
Marketing, etc.)
• Authoritative sources (HRIS,
VMS, database, etc.)
• Workflows (on/off-boarding,
transfers, etc.)
Broad Scope: Tackling too much at once
13
www.idenhaus.com
We have a Process Misalignment
EXAMPLE:
• “Asset provisioning requires
one-week lead time to configure
and ship a workstation for a user…”
• “The HR team’s SLA is to get the
worker’s HR record complete
2 days before their first payroll,
which is up to 12 business days
after the worker starts…”
SOLUTION: Integrate and optimize
processes around outcomes.
14
www.idenhaus.com
• Audit
Security control and risk reduction
• Financial Department
Cost savings / ROI
• IT Infrastructure
Efficiency and centralization
• Network Manager
Consolidation, single infrastructure,
management
• Support
Ease of administration
• Platform Owner
Reduced administration, single sign-on
• Help Desk
Reduced calls through self-service
• Application owner for HRIS
User data, integration
• Strategy
Platform and foundation for
centralized services
• Business Unit
Tactical requirements, improved security
IAM Stakeholders
15
www.idenhaus.com16
Stakeholder Analysis
Influence
Engagementlow
high
high
Wild Cards
(engage & consult)
Spectators
(keep informed)
Champions
(engage & support)
Contributors
(keep involved)
www.idenhaus.com
• Investigate and Understand Data Quality Issues
• Identify all Sources of Authoritative Data
• HR, eMail
• Follow 80-20 Rule
• ”We don’t have to boil the ocean to be successful”
• Adjust Scope
• Changes to Cost, Time, and Functionality as your understanding of
Initiatives develops
• Build (the right) Foundation to Enable Future Initiatives
Critical Success Factors in Conclusion
17
www.idenhaus.com
Idenhaus Consulting
• Who we are
– Founded in 2013
– IAM Strategy & Implementation
• Views on business impact of IAM
• Strong track record in solution delivery
– Cybersecurity
• Security Operations Center (SOC)
• NERC CIP
• Security Assessment-SAS 70/SAE16/18, ISO27001, NIST
18
www.idenhaus.com
Hanno Ekdahl
404.919.6167
hanno@idenhaus.com
Maximizing Potential in this Digital Age
Questions?
THANK YOU

More Related Content

PPTX
Securing your Azure Identity Infrastructure
PDF
Microsoft-CISO-Workshop-Security-Strategy-and-Program (1).pdf
PPTX
AppSec & DevSecOps Metrics: Key Performance Indicators (KPIs) to Measure Success
PPTX
Cloud Reference Architecture - Part 1 Foundation
PDF
Cybersecurity roadmap : Global healthcare security architecture
PDF
Threat Modeling Everything
PPTX
Microsoft Cloud Adoption Framework for Azure: Thru Partner Governance Workshop
PDF
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Securing your Azure Identity Infrastructure
Microsoft-CISO-Workshop-Security-Strategy-and-Program (1).pdf
AppSec & DevSecOps Metrics: Key Performance Indicators (KPIs) to Measure Success
Cloud Reference Architecture - Part 1 Foundation
Cybersecurity roadmap : Global healthcare security architecture
Threat Modeling Everything
Microsoft Cloud Adoption Framework for Azure: Thru Partner Governance Workshop
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...

What's hot (20)

PPTX
The secure, direct to-internet branch
PDF
Aujas Cyber Security
PDF
FireEye Portfolio
PDF
2022 Webinar - ISO 27001 Certification.pdf
PDF
Threat Modeling Using STRIDE
PDF
IT4IT real life examples & myths and rumors dispelled
PPTX
Security architecture frameworks
PPTX
What is iso 27001 isms
PPTX
Normas da família ISO 27000
PPTX
Iso iec 27001 foundation training course by interprom
PDF
Where Data Architecture and Data Governance Collide
PPTX
Secure SDLC Framework
PPTX
Data Loss Prevention from Symantec
PPT
Awareness ISMS ISO 27001:2013
PDF
Critical Review of Open Group IT4IT Reference Architecture
PDF
Blueprint for Security Architecture & Strategy.pdf
PDF
DevSecOps
PDF
FireEye Solutions
PPTX
3 Modern Security - Secure identities to reach zero trust with AAD
The secure, direct to-internet branch
Aujas Cyber Security
FireEye Portfolio
2022 Webinar - ISO 27001 Certification.pdf
Threat Modeling Using STRIDE
IT4IT real life examples & myths and rumors dispelled
Security architecture frameworks
What is iso 27001 isms
Normas da família ISO 27000
Iso iec 27001 foundation training course by interprom
Where Data Architecture and Data Governance Collide
Secure SDLC Framework
Data Loss Prevention from Symantec
Awareness ISMS ISO 27001:2013
Critical Review of Open Group IT4IT Reference Architecture
Blueprint for Security Architecture & Strategy.pdf
DevSecOps
FireEye Solutions
3 Modern Security - Secure identities to reach zero trust with AAD
Ad

Similar to Identity & Access Management
 Project Challenges and Recovery (20)

PDF
Compliance & Identity access management
PPTX
Data Breaches and Security Rights in SharePoint Webinar
PDF
Neo4j GraphDay - Securing and Auditing Active Directory - Kees Vegter, Neo4j
PDF
Active Directory securing and auditing - Kees Vegter, Neo4j
PPTX
Building & Running A Successful Identity Program
PDF
Evolving an Enterprise Architecture Practice - Spring 2015 v02 Final
PPTX
[AIIM] Getting Stuff Done with Content - Tony Peleska and Jordan Jones
PDF
Intro To Secure Identity Management
PDF
CNIT 160: Ch 2a: Introduction to Information Security Governance
PPT
EDUCAUSE_SEC10_Apr2010_Fed_Seminar_Final.ppt
PPTX
Office 365 : Data leakage control, privacy, compliance and regulations in the...
PPTX
SharePoint Access Control and Claims Based Authentication
PPT
Identity Management: Risk Across The Enterprise
PDF
Eliminating End User Tagging – Minimizing Organizational Risk and Improving B...
PDF
How To Eliminate Security Exposures in Office 365 Webinar
PDF
IDENTITY ACCESS MANAGEMENT
PPTX
Sailpoint Online Training on IAM overview
PDF
A Study in Borderless Over Perimeter
PPTX
ACEDS-Zylab 4-3-15 Webcast
Compliance & Identity access management
Data Breaches and Security Rights in SharePoint Webinar
Neo4j GraphDay - Securing and Auditing Active Directory - Kees Vegter, Neo4j
Active Directory securing and auditing - Kees Vegter, Neo4j
Building & Running A Successful Identity Program
Evolving an Enterprise Architecture Practice - Spring 2015 v02 Final
[AIIM] Getting Stuff Done with Content - Tony Peleska and Jordan Jones
Intro To Secure Identity Management
CNIT 160: Ch 2a: Introduction to Information Security Governance
EDUCAUSE_SEC10_Apr2010_Fed_Seminar_Final.ppt
Office 365 : Data leakage control, privacy, compliance and regulations in the...
SharePoint Access Control and Claims Based Authentication
Identity Management: Risk Across The Enterprise
Eliminating End User Tagging – Minimizing Organizational Risk and Improving B...
How To Eliminate Security Exposures in Office 365 Webinar
IDENTITY ACCESS MANAGEMENT
Sailpoint Online Training on IAM overview
A Study in Borderless Over Perimeter
ACEDS-Zylab 4-3-15 Webcast
Ad

Recently uploaded (20)

PDF
STKI Israel Market Study 2025 version august
PPTX
The various Industrial Revolutions .pptx
PDF
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
PPTX
Tartificialntelligence_presentation.pptx
PDF
Hybrid horned lizard optimization algorithm-aquila optimizer for DC motor
PPT
Geologic Time for studying geology for geologist
PDF
CloudStack 4.21: First Look Webinar slides
PDF
A review of recent deep learning applications in wood surface defect identifi...
PPTX
Modernising the Digital Integration Hub
PDF
sustainability-14-14877-v2.pddhzftheheeeee
PPTX
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
PPT
What is a Computer? Input Devices /output devices
PDF
A Late Bloomer's Guide to GenAI: Ethics, Bias, and Effective Prompting - Boha...
PDF
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
PDF
A novel scalable deep ensemble learning framework for big data classification...
PPTX
Benefits of Physical activity for teenagers.pptx
PPTX
Chapter 5: Probability Theory and Statistics
PDF
Unlock new opportunities with location data.pdf
PDF
Taming the Chaos: How to Turn Unstructured Data into Decisions
PPTX
Group 1 Presentation -Planning and Decision Making .pptx
STKI Israel Market Study 2025 version august
The various Industrial Revolutions .pptx
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
Tartificialntelligence_presentation.pptx
Hybrid horned lizard optimization algorithm-aquila optimizer for DC motor
Geologic Time for studying geology for geologist
CloudStack 4.21: First Look Webinar slides
A review of recent deep learning applications in wood surface defect identifi...
Modernising the Digital Integration Hub
sustainability-14-14877-v2.pddhzftheheeeee
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
What is a Computer? Input Devices /output devices
A Late Bloomer's Guide to GenAI: Ethics, Bias, and Effective Prompting - Boha...
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
A novel scalable deep ensemble learning framework for big data classification...
Benefits of Physical activity for teenagers.pptx
Chapter 5: Probability Theory and Statistics
Unlock new opportunities with location data.pdf
Taming the Chaos: How to Turn Unstructured Data into Decisions
Group 1 Presentation -Planning and Decision Making .pptx

Identity & Access Management
 Project Challenges and Recovery

  • 1. www.idenhaus.com Identity & Access Management Project Challenges and Recovery August 2017
  • 2. www.idenhaus.com • Identity and Access Management - Definition and Overview • Business Drivers for IAM • Project Challenges • Success Factors 2 Identity & Access Management Agenda
  • 3. www.idenhaus.com What is Identity & Access Management? Access Management The systems and processes that control who has access to IT resources, and what each person is entitled to do with those resources. Identity Management The systematic collection, maintenance, and distribution of identity data to support business processes and systems. 3
  • 4. www.idenhaus.com Why Identity & Access Management? Identity Personalized Content Access 2. Provided to Resources Based on Authenticated Identity 1. Verify Who 3. Services Based on Role or Preferences 4
  • 5. www.idenhaus.com Increasingly Complex Business Environments Drive Need for IAM Organizations need a “unifying framework” to organize accurate and timely information about their employees, contractors, customers, partners—Identity is that framework Complex Customer Interactions • Multiple channels, products, services drive need for single customer identity Regulatory Requirements • Demonstrate policy compliance, proper controls, auditability Security Concerns • How to manage ”need to know” • How to reduce risks of data exposure • Growing internal & external threats Information Quality • Inconsistent, inaccurate, missing data • Multiple sources, which is authoritative? Extended Enterprise • Manage contractors, partners, suppliers, and customers Improved Service Regulatory Compliance SecurityPrivacy Business Value Scalability 5 5
  • 6. www.idenhaus.com … but your systems and processes look like this 6
  • 9. www.idenhaus.com How IAM Solutions Work Personnel # Last Name Phone First Name First Name Personnel # E-mail Last Name User Profile Phone Mail Other Attributes ... Authoritative Source (SAP, Workday, Lawson) First Name Phone UserID UserID Last Name eMail UserID Email Sync to Consuming Systems Last Name First Name eMail Identity Store Bobby on Portal Create Identity & publish to ID Store Human Resources 003456 Bobby Doe 404.555.5555 bdoe@domain.com A12345 A12345 bdoe@domain.com 404.555.5555 Bobby Doe bdoe@domain.com Bobby 003456 Doe 9
  • 10. www.idenhaus.com • Data Quality Issues – Accuracy, Completeness, Availability, Latency, Consistency • Broad Scope – Internal users, external users, partners, suppliers, customers • Business Processes Misalignment with IAM – SLA – Process vs. Technology • Stakeholders Push Back – Human Resources – Asset Management – Security 4 Common Challenges with Implementing IAM 10
  • 11. www.idenhaus.com • Who are you? What uniquely identifies you? • What is your relationship to the organization? • What is your role? • Who do you manage? • What assets do you have? • How do we link: – Bob Jones in system A, with – Robert Jones in system B, with – R Jones in system C? IAM begins with accurate user data 11
  • 12. www.idenhaus.com Getting clean, consistent, and complete data into the identity store is typical hurdle for any IAM implementation. Bottom line: establishing data quality & accuracy can be a major factor in creating a functional provisioning solution. Sample of types of data needed for Identity Store: …first name, middle name, last name, cost center, location, work status, telephone number, supervisor/manager, user class (employee, contractor), expiration date (contractors), business/functional role. Data quality is a typical challenge 12
  • 13. www.idenhaus.com How big is too big? • User Types (employee, contractor, partner, etc.) • Downstream systems (AD, ERP, Marketing, etc.) • Authoritative sources (HRIS, VMS, database, etc.) • Workflows (on/off-boarding, transfers, etc.) Broad Scope: Tackling too much at once 13
  • 14. www.idenhaus.com We have a Process Misalignment EXAMPLE: • “Asset provisioning requires one-week lead time to configure and ship a workstation for a user…” • “The HR team’s SLA is to get the worker’s HR record complete 2 days before their first payroll, which is up to 12 business days after the worker starts…” SOLUTION: Integrate and optimize processes around outcomes. 14
  • 15. www.idenhaus.com • Audit Security control and risk reduction • Financial Department Cost savings / ROI • IT Infrastructure Efficiency and centralization • Network Manager Consolidation, single infrastructure, management • Support Ease of administration • Platform Owner Reduced administration, single sign-on • Help Desk Reduced calls through self-service • Application owner for HRIS User data, integration • Strategy Platform and foundation for centralized services • Business Unit Tactical requirements, improved security IAM Stakeholders 15
  • 16. www.idenhaus.com16 Stakeholder Analysis Influence Engagementlow high high Wild Cards (engage & consult) Spectators (keep informed) Champions (engage & support) Contributors (keep involved)
  • 17. www.idenhaus.com • Investigate and Understand Data Quality Issues • Identify all Sources of Authoritative Data • HR, eMail • Follow 80-20 Rule • ”We don’t have to boil the ocean to be successful” • Adjust Scope • Changes to Cost, Time, and Functionality as your understanding of Initiatives develops • Build (the right) Foundation to Enable Future Initiatives Critical Success Factors in Conclusion 17
  • 18. www.idenhaus.com Idenhaus Consulting • Who we are – Founded in 2013 – IAM Strategy & Implementation • Views on business impact of IAM • Strong track record in solution delivery – Cybersecurity • Security Operations Center (SOC) • NERC CIP • Security Assessment-SAS 70/SAE16/18, ISO27001, NIST 18