Proposal Document SailPoint IdentityNow Statement of Work
Proposal Document SailPoint IdentityNow Statement of Work
Proposal Document SailPoint IdentityNow Statement of Work
IdentityNow Implementation
Proposal Number:
.......................................................................................................................................................................................... 11
Implementation activities .............................................................................................................................................. 11
Foundational activities .............................................................................................................................................. 12
Automation ................................................................................................................................................................. 12
Compliance ................................................................................................................................................................ 13
Team Structure & responsibilities ................................................................................................................................... 13
Roles and Responsibilities .......................................................................................................................................... 14
Project Planning & Timelines .......................................................................................................................................... 14
Warranty & Post-Production Support............................................................................................................................ 14
ENH iSecure Delivery Methodologies................................................................................................................................ 16
Change Management .................................................................................................................................................. 16
Helpdesk .......................................................................................................................................................................... 16
Escalation Matrix ............................................................................................................................................................. 16
Technical Assumptions, Terms & Conditions .................................................................................................................... 17
General Terms & Conditions .............................................................................................................................................. 18
Solution areas
We expertise in the following services
• Identity Management
• Access Management
• Privileged Account Management
• Governance, Risk and Compliance
• SOx, HIPAA Consulting/COBIT implementation
Product Focus
• SailPoint IdentityNow
• SailPoint IdentityIQ
• Cyber Ark
• Okta
• Splunk
www.enhisecure.com
[email protected]
Key Contacts
Esesve Digumarthi Founder & Director [email protected] +919959800400
EnH Group
EnH also works on the broader domains of Customer Relationship Management & Cloud Solutions under its
flagship companies ENH Customer Centric & ENH SMAC Solutions respectively.
Business Challenges
My Customer is currently facing the following challenges.
1) Delays in providing day 1 access due to manual process.
2) Security risks because users having access even after they are terminated.
3) Compliance failures and access creep due to improper access reviews.
4) Joiner, Mover & Leaver hassles.
5) Access Requests which are currently being handled by the User access management/Access control
teams, manually.
As a visionary leader, the CISO/CIO would like to implement an Identity governance solution which is capable of
solving the business challenges encountered, without adding additional burden on IT teams, by adopting SaaS
solutions.
Useful features
The current section describes about features of IdentityNow that can help the customer.
Access Requests
• Users can request for any additional access in the applications from single
pane view using a shopping cart approach.
• Necessary levels of approvals can be configured to ensure Zero trust while
provisioning access.
Access Certifications
• Regular access audits can be performed easily using the access
certifications features of IdentityNow. Compliance is going to be really with
the access certifications in place.
The solution can easily scale to provide the following benefits in the future.
Analysts Feedback
SailPoint is a pioneer in Identity Governance solutions and the next sections brief about the rating / review from
market analysts.
IdentityNow Tenant
IdentityNow Tenant allotted to the customer.
VA (Virtual Appliance)
Virtual appliance is a virtual machine which acts as a connectivity gateway between customer environment
and IdentityNow Tenant. It is to be noted that the deployment of virtual appliance is fairly straightforward
process akin to deployment of any virtual machine. The maintenance of the virtual appliance is amongst the
easiest as it is configured to receive all the general and security updates automatically from SailPoint and no
manual intervention would be required in this.
VA Cluster (Virtual appliance cluster)
Virtual appliance cluster refers to a cluster of SailPoint IdentityNow Virtual appliances. This can be used for HA
(High availability) and DR (Disaster recovery) purposes. It is to be noted that VA Cluster deployment is also a
fairly straightforward process.
Miscellaneous components
As part of the solution, there are 2 other components required by the IdentityNow solution.
1. IQService: A component used during the Active Directory integration to perform provisioning on Active
Directory. This helps in provisioning various Windows/Microsoft specific infrastructure like provisioning files
shares and similar.
Functionality in scope
The following is a list of IdentityNow features that will be part of the Identity management implementation.
1. Building Identity Vault
2. Automated Life Cycle Management
3. Role Based Access Control
4. Access Requests
5. Access Certifications
Environment Commissioning
The environment commissioning shall adhere to best practices thoroughly recommended by SailPoint for
IdentityNow deployments. As per the common norms, every SailPoint IdentityNow customer is provided with 2
instances i.e., sandbox and production instances of IdentityNow product.
The following diagram provides an understanding of the environment commissioning practices that shall be
followed during the implementation.
Implementation activities
The following provides a quick overview of all the implementation activities planned for this implementation.
Foundational
Automation Compliance
activities
Manager
Infrastructure User life cycle
Certifications
provisioning. management
Configuration.
Application Ticketing
onboarding. Integration
Automation
The following activities shall be automated.
Ticketing integration
In situations where there is no recommended mode of connectivity, tickets shall be raised by IdentityNow in the
customer’s ITSM application like ServiceNow, BMC Remedy when there is need for provisioning access.
IdentityNow shall be configured to create tickets automatically in IdentityNow as required for the provisioning
operations.
Compliance
Certifications help in compliance by helping validate access present with the users.
The following certifications shall be implemented.
Manager Certifications Configuration
A managed certification is the process where manager validates the access of users directly reporting to
him/her across various applications. Invalid access shall be automatically revoked by IdentityNow in the target
applications based on the decisions from the Managers. One Manager certification shall be configured along
with email notifications and required filters.
IdentityNow Senior
Implementation Engineer
IdentityNow Sr.
Senior Implementation Engineer is responsible to develop all
Implementation 4+ Years 1
major & minor components.
Engineer
The following Gantt chart provides a high level understanding of the project plan.
Note: It is to be understood that the timelines majorly depend on the complexity of the applications to be
integrated.
One week after 45 days This support is for all code level issues only. Use
Warranty
production deployment after start case changes will not be implemented
Helpdesk
Customer may provide access to their help desk software to raise tickets. The URL agreed upon can be
leveraged for tracking as well. ENH iSecure engineers assigned for the project will be available 24/7 to provide
technical assistance if needed. The team can be contacted over e-mail & phone
Escalation Matrix
ENH iSecure has a streamlined Issue Escalation and resolution process built in within the organization. The
development and implementation teams along with project manager will escalate the issue for resolution at
various level within the organization based on the level of escalation. The team follows issue resolution,
escalation procedure during all the phases of the project lifecycle. The approach consists of issue control
mechanisms and a well-defined process that enables the project team and customer to identify, address, and
prioritize problems and issues. An escalation process ensures that the next level of management is informed
(often within a specific period of time) if an issue cannot be resolved at the lower level. Based on the level of
escalation the Project manager will address to the higher management of ENH iSecure.
1: If the issue(s) are not resolved by the L1/L2/L3 within the defined SLA’s. The customer can contact the Project
Manager and escalate the issue
2: If there is no response by the project manager for 16 working hours, then the issue can be escalated to
Delivery Head
3: In case there is no response by the Delivery Head for 2 working days, then the issue can be escalated to
CEO/VP-Operations
Sl.
Particulars Investment in INR
No
To Be provided based on
2 SailPoint IdentityNow Identity Governance implementation
the modules chosen
Note: All Applicable Taxes extra as per taxation laws of the land.
Payment terms:
1. ENH iSecure will duly invoice the customer upon milestone completion.
2. All invoices shall only be emailed. A hard copy shall be provided upon request but the delivery of the
hard copy is not considered for payment deadline.
3. The payment has to be wire transferred to ENH iSecure Private Limited Banking account within 10
calendar days after the invoice is sent via email.
4. Delays might attract penalties.
20
Confidential: ENH iSecure – <<Customer Name>>