1 / 12
文档名称:

Gartner A Decision Framework for Initial Identity and Access Management Planning Jan 2008.pdf

格式:pdf   页数:12
下载后只包含 1 个 PDF 格式的文档,没有任何的图纸或源代码,查看文件列表

如果您已付费下载过本站文档,您可以点这里二次下载

Gartner A Decision Framework for Initial Identity and Access Management Planning Jan 2008.pdf

上传人:kuo08091 2014/5/15 文件大小:0 KB

下载得到文件列表

Gartner A Decision Framework for Initial Identity and Access Management Planning Jan 2008.pdf

文档介绍

文档介绍:Research
Publication Date: 29 January 2008 ID Number: G00154695

A Decision Framework for Initial Identity and Access
Management Planning
Earl Perkins, Ant Allan
As the number of formal identity and access management (IAM) projects grow,
enterprises want a simple framework for decisions on how to launch them. This research
proposes a framework for doing that.

Key Findings
• IAM planning decisions occur in enterprises in many ways, but they need to be
coordinated and structured to render effective planning results.
• Early IAM planning brings together similar business needs for IAM across the enterprise
to reduce duplication of effort, cost plexity.
• Drivers for IAM are different among markets and have different levels of impact. These
drivers can affect the priority by which enterprises decide to address IAM decisions.
• An effective IAM decision framework should identify, prioritize anize decisions
and, ultimately, resources to allow an enterprise the means to fill gaps in its evolving
IAM strategy.
mendations
• Don't use this research as a substitute for real project management planning to deploy
IAM. Gartner's framework is only meant to be an aid anize the first steps of
planning for an IAM initiative.
• Don't allow IAM discussions to be driven by vendors or solely by a regional (that is,
divisional, departmental and sectional) or limited corporate agenda. IAM is an
enterprisewide agenda issue. Even if it is not addressed initially as an enterprise
program, treat it as such, with a structured approach to initial planning.
• Use the output of this framework when necessary municate the value of IAM to
the enterprise (that is, "sell" IAM to the business with anized planning results).
• Ensure that there is ownership of the IAM planning activity. If that ownership is not
assigned by executive sponsorship, then mend assignment through your
information security governance structure.