Quantcast
Channel: identity management – Security Catalyst
Browsing all 25 articles
Browse latest View live

Identity Management Series – HR as a Source of Record Part 3: Transfers

In the last article, we discussed the HR considerations for enabling auto-provisioning/auto-assignment of tasks for new hires. Now we’ll address transfers. Employees are, by definition, only hired...

View Article



Image may be NSFW.
Clik here to view.

Identity Management Series – HR as a Source of Record Part 4: Terminations

In the last article, we discussed how to identify access transfers from HR data. Now we’re in the home stretch: terminations. Compared to transfers, terminations are pretty easy, but there are a...

View Article

Identity Management Series – HR as a Source of Record Part 5: Reliability and...

We’ve now gone through the employee’s full lifecycle and discussed how to interpret and manipulate HR data to facilitate automation in identity management for new hires, transfers, and...

View Article

Identity Management Series – Role- and Rule-Basing Part 1: Introduction

At this point in the identity management process it is time to consider what access the company’s job functions should have to begin creating roles and rules. This is the first step in automating...

View Article

Identity Management Series – Role- and Rule-Basing Part 2: Identifying &...

The first step in role- and rule-basing is identifying and prioritizing the enterprise roles. This sets the direction for the entire effort, which – make no mistake – will be time consuming. Doing...

View Article


Image may be NSFW.
Clik here to view.

Identity Management Series – Role- and Rule-Basing Part 3: Designing and...

Now that enterprise roles have been identified and prioritized, it’s time to tackle IT roles, and figuring out IT roles is where the rubber meets the road. Chances are, neither the department heads...

View Article

Identity Management Series – Role- and Rule-Basing Part 4: Documentation and...

Once all of the roles are defined, it’s time to document them and obtain approval for their use. We’re now past the point where the distinction between enterprise and IT roles matters, so in this...

View Article

Identity Management Series – Role and Rule Basing Part 5: Implementation and...

The final step in this month’s activity is to implement the roles and clean up any extraneous access that’s left behind. As in the previous segment, the distinction between enterprise and IT roles...

View Article


Identity Management Series – Workflows Part 1: Introduction

We started developing workflows in last month’s activity to manage vacancies. Relatively speaking, vacancy management workflows are comparatively simple and provide business-relevant quick-wins,...

View Article


Identity Management Series – Workflows Part 2: Provisioning and Deprovisioning

In this month’s Introduction, three workflow sets were introduced: Provisioning and deprovisioning (which I abbreviate as de/provisioning) Non-employee management User or access recertification This...

View Article

Building the Foundation for Successful Password Self-Service Part 2: Password...

In my last article, we explored how a properly implemented password self-service mechanism can yield a quick and early return on the identity management journey. Password self-service is a cornerstone...

View Article

Building the Foundation for Successful Password Self-Service Part 3:...

So far we have established the value of properly implementing password self-service and successfully tackled building effective password governance. The next step is to develop “challenge...

View Article

Building the Foundation for Successful Password Self-Service Part 4: Initial...

In the last article, we discussed how to establish appropriate challenge questions to facilitate password self-service. But that’s just half of the password self-service equation. The other half has...

View Article


Building the Foundation for Successful Password Self-Service Part 5: User...

So far this month, we’ve updated the <password policy>, created appropriate <challenge questions>, and come up with a strategy for setting initial passwords. Now we are ready to start...

View Article

Image may be NSFW.
Clik here to view.

Identity Management Series – HR as a Source of Record Part 2: New Hires

In my last article, I introduced the importance of understanding the HR system and putting that into the context of using HR data to manage identities. This is a big challenge because while the HR...

View Article


Identity Management Series – HR as a Source of Record Part 3: Transfers

In the last article, we discussed the HR considerations for enabling auto-provisioning/auto-assignment of tasks for new hires. Now we’ll address transfers. Employees are, by definition, only hired...

View Article

Image may be NSFW.
Clik here to view.

Identity Management Series – HR as a Source of Record Part 4: Terminations

In the last article, we discussed how to identify access transfers from HR data. Now we’re in the home stretch: terminations. Compared to transfers, terminations are pretty easy, but there are a...

View Article


Identity Management Series – HR as a Source of Record Part 5: Reliability and...

We’ve now gone through the employee’s full lifecycle and discussed how to interpret and manipulate HR data to facilitate automation in identity management for new hires, transfers, and...

View Article

Identity Management Series – Role- and Rule-Basing Part 1: Introduction

At this point in the identity management process it is time to consider what access the company’s job functions should have to begin creating roles and rules. This is the first step in automating...

View Article

Identity Management Series – Role- and Rule-Basing Part 2: Identifying &...

The first step in role- and rule-basing is identifying and prioritizing the enterprise roles. This sets the direction for the entire effort, which – make no mistake – will be time consuming. Doing...

View Article
Browsing all 25 articles
Browse latest View live




Latest Images