IAM and Security Automation
Consulting Services

At Identity Centric, we are automation specialists! Enterprises have made huge investments in digitally transforming their business process like onboarding, off-boarding, SOC monitoring etc. But there still remains a significant amount of manual processes that slow down an organisations ability to be agile and exposes them to risks.

News LetterLearn MoreLinkedIn
Identity Centric

IAM & Security Automation Consulting Services

At Identity Centric, we are automation specialists! Enterprises have made huge investments in digitally transforming their business process like onboarding, off-boarding, SOC monitoring etc. But there still remains a significant amount of manual processes that slow down an organisations ability to be agile and exposes them to risks.

Enterprises can achieve massive savings in cost and improving security posture by automation of day to day process both in IT and the Security Operations Centre.

We also see a significant shift in how IT and Security are managed within enterprise leading convergence of what stayed as different domains, IT and Cyber security. 

With 20+ experience across the two domains, Identity and Access Management (IAM) and SOAR (Security Orchestration Automation and Response), we are positioned uniquely to not just help organisations automate their IAM and SOC processes but also to look at synergies and further reduce cost of doing business and managing security.

JML - Lifecycles

1. Leavers / Movers / Joiners

Why that order for what's usually known as JML?
(Joiner, Mover, Leaver)

The Leaver process, if not carried out successfully, poses the HIGHEST RISK to a company, so should therefore be dealt with first.

User provisioning is a complex task for administrators, but with good organisation, standardised processes and automation you can ensure that all important steps are completed in a timely manner. This will save your company both time and money. At Identity Centric we can show you many ways of stream-ling your Identity programme with the goal of making it successful by using best practises. That does tend to mean that the customisations that your IT guys wanted will have to be carefully considered for inclusion. We've seen far too many projects fail due to customers insistence that they MUST have various customisations.

2. Risk Approach

With every project we take a Risk approach.
i.e. We analyse what elements would be considered the highest risk to a company and tackle the high risk elements first.

If you have read the analysts reports about IAM over the years you'll see that more and more they feature RISK as a good approach to an Identity and Access Managemernt programme. This is simply because the amount of identities, accounts and permissions/entitlements have become too much for human beings to handle. If you can segregate high Risk identities and focus on getting them the correct access to the right applications first, then your company risk profile will inevitably go down. Make Risk the focus of your Access reviews and certifications.

LEAVERS

Leavers are generally detected by receiving information from a Human Resources feed.
This can be in the form of a simple leaver flag saying Active=false or can be an End Date field with the persons final work date populated.

Leavers can also be initiated ad-hoc by a Manager via a form in cases where an instant suspension of access is required.

As a result of a trigger like one of the above, a lifecycle event is kicked off, a workflow to take the appropriate action of suspending access as required via the connected applications and by raising tickets or emails where direct connectivity is not present.
e.g. Physical assets, non-connected applications.

Additional Tasks
As well as suspending application accounts for a leaver there are often other tasks to perform. Some of these may include, but are not limited to:

- Archive home folders and place on a remote drive ready for archival storage.

- Notify relevant departments about physical assets that may need to be retrieved.
e.g. Car, Laptop, Phone etc.

- Arrange for device wiping.
e.g. Laptop, Phone.

- Delete application accounts after a pre-configured time.
e.g. 90 Days.

MOVERS

Movers can present a number of headaches for a business. It could be a simple Department move or a Location change for example. More often than not it gets more complex than that.

Department Move Example
The mover maybe moving from the IT Department to the Finance Department. The departmental Managers may agree that there needs to be some overlap period involved, maybe a month or two whereby the Mover has access to the applications and permissions from their old job in IT as well as the new job Finance applications.

Clearly there is Risk involved here.

The IAM system needs to be aware of the overlap period and provision the new Finance access for the Mover. After the agreed overlap period expires, de-provisioning of the users original IT Access must be carried out. This should also be followed up with an Automated Access Review to both Managers for the Mover to have them sign off on the eventual new set of access.

There are numerous permutations for mover processes and flexibility is needed within your Lifecycle Mover Workflows to accomodate this.

We can help you achieve this.

JOINERS

In the same way as Leavers, Joiners are generally detected by receiving information from a Human Resources feed.
This can be in the form of a simple joiner flag saying Active=True or can be a Start Date field with the persons hire/start date populated. New Hires can also be initiated ad-hoc by a Manager via a form in cases where an instant start and immediate requirement for access is required. e.g. Contractor.

As a result of a trigger like one of the above, a lifecycle event is kicked off, a workflow to take the appropriate action of creating the correct application accounts and granting the correct access as required via the connected applications and by raising tickets or emails where direct connectivity is not present. e.g. Physical assets, non-connected applications.

Additional Tasks
As well as provisioning application accounts for a joiner there are often other tasks to perform. Some of these may include, but are not limited to:

- Email notifications to interested parties.
e.g. Manager, Training Department and more.

- Notify relevant departments about physical assets that may need to be purchased.
e.g. Car, Laptop, Phone, Desk, Chair etc.

- It's also always very polite to ensure a Welcome Email is present in the joiners Inbox too.

CERTS

Certifications, Access Reviews, everyone seems to have a different name for these. In essence though "Certs" are used to facilitate management, application and role owners certifying people's access. i.e. Certifying that who has access to what is correct.

Certifications are usually driven by governance functions external to a company and where the company is obliged to comply with certain industry standards.

The problem with these Certs / Access reviews is that they are large and cumbersome, it is not unusual for a line manager to have to certify ten's of accounts along with thousands of permissions for their staff.

Identity and Access Management tools can clearly help in this area but bare in mind that it's not all about the tool. Identity Centric can help build good practises around certifications in terms of employee awareness and a good Communication Campaign to go along with each certification cycle.

Take up of certs / access reviews can be quite poor at first, sometimes with less than 30% of the review completed within the set time frame. After employee education and good communication campaigns to run along side, 30% can turn into 80%+

Identity & Access Management Expert Services

Everything you need to make your Joiner, Mover, Leaver and Certification processes run smoothly, and that's just to start!
We have experts with over 15 years of experience on multiple Identity products. Whether you are using Gartner Customers’ Choice listed Identity leaders like Sailpoint IdentityIQ and IdentityNow, Okta, Savyint or Oracle Identity Governance products, or if you are using leaders like Omada, IBM etc. There's not much we haven't had to implement and we can be your trusted advisor when it comes to making your IAM project successful. 

Services Offerings

Security Automation Expert Services

Security Orchestration Automation and Response (SOAR) are essential tools helping enterprise Security Operation Centre (SOC) to triage, investigate and remediate the ever growing number of alerts that they need to deal with. SOAR tools enable the security teams to fight threats at machine speed by reducing the mean time to detect and respond (MTTD and MTTR) by as much as 90%, in some cases reducing the investigation times from days to hours and minutes. 

Identity Centric is uniquely positioned to help enterprise security automate their SOC processes. Our consulting team has experience across multiple market leading SOAR platforms and working with SOC teams at some of the largest organisations in Europe. We have expertise implementing no-code, low-code and traditional python scripting driven legacy SOAR platforms

Read More...

IAM Expert Services

Identity and Access Management programmes can be daunting, unlike many other technologies where technologists keep talking jargon, we take a business-centric approach. Our team will strive to meet business needs by having open conversations with businesses in simple language. Good communication is the key to project success.

We are in a highly significant position with the IAM skill-sets our staff possess. We can offer consultation or managed services to your organisation with respect to identity and access management projects. Whether on-premises or cloud-hosted, we have a combined founding team experience with over 30 years of experience spanning all elements of Identity and Access Management, Data, and Cloud Technologies.

Read More...

JML - Lifecycles

1. Leavers / Movers / Joiners

Why that order for what's usually known as JML?
(Joiner, Mover, Leaver)

The Leaver process, if not carried out successfully, poses the HIGHEST RISK to a company, so should therefore be dealt with first.

User provisioning is a complex task for administrators, but with good organisation, standardised processes and automation you can ensure that all important steps are completed in a timely manner. This will save your company both time and money. At Identity Centric we can show you many ways of stream-ling your Identity programme with the goal of making it successful by using best practises. That does tend to mean that the customisations that your IT guys wanted will have to be carefully considered for inclusion. We've seen far too many projects fail due to customers insistence that they MUST have various customisations.

2. Risk Approach

With every project we take a Risk approach.
i.e. We analyse what elements would be considered the highest risk to a company and tackle the high risk elements first.

If you have read the analysts reports about IAM over the years you'll see that more and more they feature RISK as a good approach to an Identity and Access Managemernt programme. This is simply because the amount of identities, accounts and permissions/entitlements have become too much for human beings to handle. If you can segregate high Risk identities and focus on getting them the correct access to the right applications first, then your company risk profile will inevitably go down. Make Risk the focus of your Access reviews and certifications.

LEAVERS

Leavers are generally detected by receiving information from a Human Resources feed.
This can be in the form of a simple leaver flag saying Active=false or can be an End Date field with the persons final work date populated.

Leavers can also be initiated ad-hoc by a Manager via a form in cases where an instant suspension of access is required.

As a result of a trigger like one of the above, a lifecycle event is kicked off, a workflow to take the appropriate action of suspending access as required via the connected applications and by raising tickets or emails where direct connectivity is not present.
e.g. Physical assets, non-connected applications.

Additional Tasks
As well as suspending application accounts for a leaver there are often other tasks to perform. Some of these may include, but are not limited to:

- Archive home folders and place on a remote drive ready for archival storage.

- Notify relevant departments about physical assets that may need to be retrieved.
e.g. Car, Laptop, Phone etc.

- Arrange for device wiping.
e.g. Laptop, Phone.

- Delete application accounts after a pre-configured time.
e.g. 90 Days.

MOVERS

Movers can present a number of headaches for a business. It could be a simple Department move or a Location change for example. More often than not it gets more complex than that.

Department Move Example
The mover maybe moving from the IT Department to the Finance Department. The departmental Managers may agree that there needs to be some overlap period involved, maybe a month or two whereby the Mover has access to the applications and permissions from their old job in IT as well as the new job Finance applications.

Clearly there is Risk involved here.

The IAM system needs to be aware of the overlap period and provision the new Finance access for the Mover. After the agreed overlap period expires, de-provisioning of the users original IT Access must be carried out. This should also be followed up with an Automated Access Review to both Managers for the Mover to have them sign off on the eventual new set of access.

There are numerous permutations for mover processes and flexibility is needed within your Lifecycle Mover Workflows to accomodate this.

We can help you achieve this.

JOINERS

In the same way as Leavers, Joiners are generally detected by receiving information from a Human Resources feed.
This can be in the form of a simple joiner flag saying Active=True or can be a Start Date field with the persons hire/start date populated. New Hires can also be initiated ad-hoc by a Manager via a form in cases where an instant start and immediate requirement for access is required. e.g. Contractor.

As a result of a trigger like one of the above, a lifecycle event is kicked off, a workflow to take the appropriate action of creating the correct application accounts and granting the correct access as required via the connected applications and by raising tickets or emails where direct connectivity is not present. e.g. Physical assets, non-connected applications.

Additional Tasks
As well as provisioning application accounts for a joiner there are often other tasks to perform. Some of these may include, but are not limited to:

- Email notifications to interested parties.
e.g. Manager, Training Department and more.

- Notify relevant departments about physical assets that may need to be purchased.
e.g. Car, Laptop, Phone, Desk, Chair etc.

- It's also always very polite to ensure a Welcome Email is present in the joiners Inbox too.

CERTS

Certifications, Access Reviews, everyone seems to have a different name for these. In essence though "Certs" are used to facilitate management, application and role owners certifying people's access. i.e. Certifying that who has access to what is correct.

Certifications are usually driven by governance functions external to a company and where the company is obliged to comply with certain industry standards.

The problem with these Certs / Access reviews is that they are large and cumbersome, it is not unusual for a line manager to have to certify ten's of accounts along with thousands of permissions for their staff.

Identity and Access Management tools can clearly help in this area but bare in mind that it's not all about the tool. Identity Centric can help build good practises around certifications in terms of employee awareness and a good Communication Campaign to go along with each certification cycle.

Take up of certs / access reviews can be quite poor at first, sometimes with less than 30% of the review completed within the set time frame. After employee education and good communication campaigns to run along side, 30% can turn into 80%+