Skip main navigation

Wrap-up

Learn how to approach implementation in the IdAM context.
Let’s wrap up what you have learned.

  • We need to have a good understanding of the ‘why’ – why we are implementing or updating our identity and access management system, which is something that factors into our business case.

  • Legal and regulatory constraints and motivators may be part of the business case.

  • It is important to understand ‘where we are’ and ‘where we want to be’ – and to address the gap with a solution.

  • A business case allows management teams to consider whether to sponsor the project. The project will need initial and ongoing support from senior managers.

  • Business, functional, technical and security requirements need defining, testing, and approval to form a specification of work.

  • All solutions proposed need to consider the existing environment and need to consider strategic “fit”.

  • Service availability and other contract-related issues need addressing prior to implementation.

  • Increasingly, solutions generate multi-vendor environments, which needs careful consideration when reviewing support arrangements.

This article is from the free online

Cyber Security Foundations: Reinforcing Identity and Access Management

Created by
FutureLearn - Learning For Life

Reach your personal and professional goals

Unlock access to hundreds of expert online courses and degrees from top universities and educators to gain accredited qualifications and professional CV-building certificates.

Join over 18 million learners to launch, switch or build upon your career, all at your own pace, across a wide range of topic areas.

Start Learning now