Applying a business-driven approach to meet today’s IAM challenges

A prominent Canadian research institution faced significant challenges with its legacy identity and access management (IAM) solution. The outdated system struggled to keep pace with the university's evolving needs, hindering operational efficiency and posing potential security risks. KeyData Cyber was engaged to conduct a comprehensive assessment of their IAM program and guide them towards a modern, scalable solution.

Healthcare professional working on a computer.

Highlights

Challenge

A leading Canadian research institution found itself grappling with the limitations of its outdated identity and access management (IAM) system. Their legacy solution, NetIQ Identity Manager, struggled to keep pace with the university's growing needs and evolving technological landscape. This presented a multitude of challenges, including difficulties in scaling the system, integrating essential lifecycle management tools, and a lack of internal expertise to effectively navigate a transition to a modern IGA solution.

These limitations hindered efficient user management, hampered operational agility, and posed potential security risks. Recognizing the urgent need for a robust and adaptable IAM strategy, the institution turned to KeyData Cyber for expert guidance and support.

Solution

We were engaged by this client for a broader IAM Assessment, which included a thorough process-based assessment to determine control gaps and opportunities for improvement. We also helped to guide this client's IAM Program and perform a technology health-check on their existing deployment. Our comprehensive approach encompassed:

  • Current State Assessment and Target State Design: We assessed our client's existing IAM processes and developed target state processes and control standards for access certifications, onboarding, off-boarding, and cross-boarding.
  • Risk-Based Framework: We implemented a proactive risk management approach by designing a violation notification workflow with escalations based on risk scores. We also collaborated with the business to define clear segregation of duties (SoD) policies and rules.
  • Technology Guidance: We conducted an analysis of two IAM solutions under consideration and recommended the best-fit technology. We also performed a health check on their existing SailPoint IIQ implementation.
  • Strategic Planning: We developed an Enterprise IAM Roadmap for the rollout of the access governance solution and new access management processes.
  • Knowledge Transfer & Enablement: We provided customized training workshops and staff mentoring to empower our client's technical resources.
  • Implementation Support: We provided advisory and implementation services for McGill's migration from their legacy Identity Management Platform to SailPoint IIQ, leveraging various data sources and implementing lifecycle processes.

Outcomes

Working closely with our client, we were able to achieve the following outcomes:

  • Strategic Guidance: We guided our client towards a business-oriented IAM program, providing the necessary artifacts, processes, policies, and technical architecture.
  • Optimization and Remediation: Our review of our client's existing IAM deployment identified key areas for improvement and remediation activities to enhance service functionality and gain stakeholder support.
  • Knowledge Transfer & Empowerment: The training workshops equipped our client's technical and non-technical staff with the understanding and skills needed to effectively leverage their IAM solution and execute their IAM roadmap.

By conducting a comprehensive IAM assessment and providing strategic guidance, KeyData Cyber empowered this client to overcome its identity management challenges. We helped them transition from a limited legacy system to a modern, scalable solution that meets their growing needs.

Our team facilitated the development of a robust IAM program, complete with optimized processes, clear policies, and a risk-based approach to security. Through knowledge transfer and enablement initiatives, we ensured the institution's staff were well-equipped to manage their new IAM solution effectively.

With a clear roadmap and the right tools in place, the institution is now positioned to improve efficiency, reduce risk, and support its ongoing growth.

Ready to optimize your IAM program and achieve similar results? Contact us today to begin your journey towards a more secure and efficient identity management strategy.

Contact Us

Don't know
where to start?

Looking to assess your current state, map out strengths, identify gaps and design a tailored roadmap to an optimal target state IAM program?

Book your complimentary assessment workshop and get started today.

Get Started
KeyData Cyber Logo

Copyright © 2024 KeyData Cyber.
All Rights Reserved.

keydatacyber twitterkeydatacyber facebookkeydata-associates linkedinkeydatacyber instagramKeyData Cyber youtube