IAM Strategy
IAM is a combination of processes, technologies, and policies enabled by software to manage digital identities in their lifecycle and specify how they are used to access resources. IAM is a superset of AAA (Authentication, Authorization, Auditing)*. Here are some general strategies for enterprise to consider:
- Obtain executive sponsorship because IAM is an important part of information security
- Understand your business and define processes first
- Automate provisioning process
- Offer self services to employees
- Buy: Directory Servers, Meta Directories, Virtual directory servers, Administration products (directory and PKI management tools, and provisioning products)
- Build: Access Layer, Workflow Processes
- Architect: Integrates above compoments and processes together, takes forethought and skill (may not need all components at first)
- Lay out requirements and business logics as much as possible before starting integration
- Before signing a contract with any vendor, check out references and foster a good partner relationship
*Note: Gartner and Forrester have 4 A's with additional Administration. Auditing is also referred as Audit or Accounting or Accountability.