Best Practices - For - IAM - Solution - Implementation
Best Practices - For - IAM - Solution - Implementation
Best Practices - For - IAM - Solution - Implementation
- Nilesh Shirke
The Identity & Access Management (IAM) solution is a technology solution with relevant
business processes interwoven to manage users’ identities and their accesses to application
estate of the Organization. Access journey of any IT application begins with authenticating a
user and granting right access privileges based on his/her role. Prima facie it looks like a
standard set of activities are needed by most; hence automating them becomes pertinent
which is crafted by the IAM solution. But if we don’t consider it to be a well-thought program
driven by IT architectural vision then we end up having multiple silo IAM solutions
implemented in business divisions across the Organization. It then becomes a task in itself to
maintain them. Implementation of a strong authentication, federating identity, risk based
authorization and role management enhances the IAM solution’s canvas & adds to
implementation challenges.
The IAM solution is indeed becoming an integral part of growing business, yet enduring the
implementation program is not simple. Most programs tend to drift away from project
schedules due to implementation oversights. But by adhering to best practices listed below,
an IAM program can achieve its intended business objectives.
Organizations should clearly state their long term objectives by deliberating IAM solution as a
business solution; not just a mere tech- solution. Architecting it as a common capability
involving technology solution with business processes and tying all ends up would realize true
business value. This requires meticulous planning, aiming towards eliminating the need for
implementation of similar solutions elsewhere in the Organization. Following points should be
considered while the IAM solution is being conceived:
1. Current IT architecture of Organization & future roadmap – Along with existing IT &
network architecture, due consideration should be given to current/future IT
transformation programs such as laying of service oriented architecture (SOA) or
private/public cloud infrastructure etc. This will influence IAM solution architecture &
design.
e.g. Role Engineering will help craft 50 feasible roles & their entitlements for the
Organization of 500 employees. Thus, using these 50 roles as subjects for authentication &
authorization would streamline the business process framework and simplify security
governance.
The product selection should be based on business needs compiled from all facets of business
functions. Apart from this, following activities will be equally important in laying a concrete
foundation for the IAM solution:
This entire exercise would ensure the smooth implementation of IAM program. It will also
improve the solution’s adaptability & maintainability.
And so on. This would facilitate quick adoption of IAM solution across the user community.
At the same time, each stage should include proper mix of SDLC phases with implementation
of multiple proofs of concepts to arrive at the overall feasibility of IAM solution. The
compatibility verification of the IAM technology with current network and IT applications
would aid in defining the scope of each stage. Typical steps that would include in this
approach are as follows:
Consolidating all stages to stretch IAM functionality as a common capability cutting across
heterogeneous IT systems & platforms spanning multiple business divisions will be easier to
tackle from program management point of view.
Educate the user community
Mostly, we see that IT trainings consider implementation part of technology products with
the cook-books detailing each step. The training program lacks discussion on base technology,
product capabilities, extendibility, etc. Educating the different stakeholders on the IAM
technology & capability portfolio holds equal importance. It should be an integral part of the
IAM program. Different user communities necessitate education on different aspects of the
solution.
The IT staff would need to be educated in advance to exploit the product capabilities. Let’s
take an example of an organization where identity management solution had been
implemented but identity synchronization between different user repositories was not
enabled or not known to the IT staff. A separate solution covering this aspect is being
implemented using some other technology solution. So, 20% of the product capability has
gone unutilized, plus there is additional CAPEX as well as OPEX for the separate solution. The
education would ensure that the implementation of IAM solution would be complete,
underpinned with fundamental principles.
Business SMEs should also be educated on product capability offerings so that the right mix of
manual & automated processes can result in more business efficiency.
Operations should be educated on what capabilities have been implemented vs what have
been left unattended, in addition to the know-hows of the solution. This will bring in
efficiency in tackling user as well as system administration issues.
This education should not be considered as one-time endeavour. Users need to be refreshed
to keep up with induction of new processes and emerging product capabilities. More you
educate more would be exploitation of the technology. This would follow successful
adaptation of the IAM solution as common capability within user community.
Summary
The IAM solution plays a key role in enabling interactions and transactions in prevalent digital
world. Some IAM capabilities are required for providing end-to-end security, thus aiding
determination of the security posture of the organization. Hence, success of IAM
implementation programs has become one of the business imperatives. But majority of IAM
implementations have suffered road-blocks & have ultimately been stalled; mostly due to
failure to manage the program well. By following best practices, it is possible to implement
the IAM projects to realize business value. The discussion can be summarized as follows:
Embrace the Identity Vision: Having consistent IT architectural vision, keeping present/future goals,
short/long term business perspectives & aligning IAM vision along with it would help in stretching the
solution as common capability
Structure the foundation right: Getting the business principles in-place before implementing the
technology controls would make IAM solution implementation more flexible to sustain frequent
technology evolutions
Undertake Staged Implementation: Implementing the IAM program in stages, starting small to result in
The successful IAM program improves security posture of the Organization. It also acts as
business enabler by providing a secure work environment to develop, offer services to its end
customers and provide opportunities for new business initiatives. The compliance with
industry regulations, reduction in IT administration costs and improvement in user
productivity along with realizing user-delight are some of the benefits recognized with the
successful implementation of IAM program.
(Nilesh Shirke is the IAM practice head in Security Consulting at Tech Mahindra. He has 15+
years of experience in Project Delivery & Security management roles in IT and Business. He has
completed his masters in Information Systems from Johns Hopkins University, USA & is SUN as
well oracle IAM certified consultant. His areas of expertise are Security Consulting and
Project/delivery management in Identity & Access management domain.)