Cybertalk link (YouTube): https://www.youtube.com/watch?v=gOzKDfmAqeQ
Cybertalk link (LinkedIn): https://www.linkedin.com/posts/madhukeshwarb_identityandaccessmanagement-cybersecurity-activity-7032539296284758016-q7gE?utm_source=share&utm_medium=member_desktop
Identity Access Management (IAM) is defined by Gartner as “the security discipline that enables the right individuals to access the right resources at the right times for the right reasons”
The definition looks simple, but the implementation is not!
Contrary to the popular belief, IAM is not mere technology implementation, but rather a business-focused enterprise-wide strategic set-up. Hence, like any other Cybersecurity transformation, IAM implementation needs a clear strategy aligned to the Organization’s strategic priorities as well as long term view. It is important to remember that IAM impacts every employee (internal user of IT applications), contractors, and in some cases customers in case they access your IT systems. Hence, the user experience should be the centre of IAM implementation. Million-dollar technology investments will go down the drain if the users are not happy due to usability issues.
IAM implementation is a strategic decision irrespective of the initial scale in scope. Have a big picture view in mind when commencing the implementation. The implementation should not be done hurriedly. The IAM rollout is a multi-year enterprise-wide transformation. It requires disciplined programme/project management for the delivery of the intended benefits.
Comments