Identity and Access Management
IAM Infratructure
Plan a flexible IAM architecture as a means of facilitating Governance, Compliance, and Risk (GCR) management through the use of Infrastructure as Code, Governance as Code, and Policies as Code, for soft real-time, explicitly evaluated, adaptive trust in a zero standing privileges and zero-trust architecture.
This document attempts to align requirements and perspectives of:
- Governance, Risk management and Compliance (GRC)
- Information Security
- HR department
- Information Technology
- Cyber Security
The Information Security team and the HR department are often considered as part of Governance, Risk management and Compliance, and the Cyber Security team as part of Information Technology, but given their significant impact for an effective planning of projects built around IAM, they have been included in the list as separate entities.
The implementation of a proper IAM infrastructure requires the involvement of people from diļ¬erent teams and departments. Underestimating the need to involve all stakeholders at an early stage will lead to delays, waste of money and resources, and poor adoption.
The following is an incomplete list of candidate stakeholders:
- Governance, Risk management and Compliance (GRC)
- Human Resources (HR)
- Information Security (especially the Chief Information Security Officer)
- Data Protection Officer
- Compliance Officers
- Risk Management team
- Internal Auditors
- Legal team
- Financial risk team
- Information Technology
- CTO
- Software Architects
- Cyber Security
- Site Reliability Engineering (SRE)
- Platform team
- Business Application Owners
- Engineering Managers
Workforce IAM
- HR-Driven Identity Lifecycle
- Application Lifecycle Management (ALM) connected with the Asset Catalog
- Automated Provisioning
- Policy Based
- Zero Trust Architecture
- Services
- line manager
- Unified Endpoint Management (UEM) and Mobile Device Management (MDM)
- License Management
- Procedure and Processes
Many procedures and processes will benefit from a well-built IAM infrastructure. To name a few:
- Business Continuity
- Disaster Recovery
- Internal Audits