When Identity Governance Gets Tough, the Tough Get Help

There’s no getting around it: Identity governance and administration can be challenging and complex components of IT security. Whether it’s carrying out “Joiners, Movers, Leavers” processes, handling access requests, doing access review certifications or taking on any of a number of other governance-related responsibilities, it can often seem like there are a dozen different ways to approach the work at hand, and very little clear guidance for what might be the best approach. And, of course, “best” is a relative term that can mean something different to different organizations, adding even more complexity to the scenario.

Technology helps by bringing automation and standardization to identity governance and administration. But the greatest value comes in knowing how to use that technology to its greatest advantage. That’s why, through many years of helping organizations with identity governance and administration projects, RSA has developed recommended practices for various governance challenges that organizations can apply to their own situations to streamline the work and lighten the load. Here are three examples of RSA-recommended practices for identity governance and administration processes.

Joiners, Movers, Leavers: These recommended practices facilitate moving effectively through the identity lifecycle, from the time someone joins an organization, to the time they spend in different roles there, to the time they leave and possibly even rejoin. RSA offers recommended practices for evaluating data sources, identifying user data that specifically supports identity management and defining the processes associated with the identity lifecycle (such as keeping track of key milestones like start, transfer and (Read more...)

*** This is a Security Bloggers Network syndicated blog from RSA Blog authored by Tim Norris. Read the original post at: