Skip to main content

Identity and Access Management

Business Performance Through Connected Intelligence

  • 1st Edition - November 19, 2013
  • Latest edition
  • Author: Ertem Osmanoglu
  • Language: English

Identity and Access Management: Business Performance Through Connected Intelligence provides you with a practical, in-depth walkthrough of how to plan, assess, design, and d… Read more

Purchase options

Sorry, this title is not available for purchase in your country/region.

Data Mining & ML

Unlock the cutting edge

Up to 20% on trusted resources. Build expertise with data mining, ML methods.

Description

Identity and Access Management: Business Performance Through Connected Intelligence provides you with a practical, in-depth walkthrough of how to plan, assess, design, and deploy IAM solutions. This book breaks down IAM into manageable components to ease systemwide implementation. The hands-on, end-to-end approach includes a proven step-by-step method for deploying IAM that has been used successfully in over 200 deployments. The book also provides reusable templates and source code examples in Java, XML, and SPML.

Key features

  • Focuses on real-word implementations
  • Provides end-to-end coverage of IAM from business drivers, requirements, design, and development to implementation
  • Presents a proven, step-by-step method for deploying IAM that has been successfully used in over 200 cases
  • Includes companion website with source code examples in Java, XML, and SPML as well as reusable templates

Readership

Chief Information Security Officers (CISOs), Directors of Information Security, information security consultants, Security Systems Architects, SAML developers, and Security Managers

Table of contents

SECTION 1 – Business Case and Current State

Chapter 1 - IAM Framework, Key Principles and Definitions

Chapter 2 – Business Requirements

Chapter 3 – Business Case Development

Chapter 4 – Current State and Capability Maturity

Chapter 5 – Key Challenges and Critical Success Factors

Chapter 6 – Case Studies

SECTION 2 – Future State and IAM Roadmap

Chapter 7 – Future State Definition

Chapter 8 – IAM Roadmap and Strategy

Chapter 9 – A Risk Based Approach to IAM

Chapter 10 – A Service Based Approach to IAM (Cloud / Managed Service)

Chapter 11 – IAM for End-user Computing Devices

Chapter 12 – Case Study

SECTION 3 – Implementation

Chapter 13 – Implementation Methodology and Approach

Chapter 14 – IAM Services

Chapter 15 – Identity Definition and On-boarding

Chapter 16 – Access Request and Approval

Chapter 17 – Provisioning and De-provisioning

Chapter 18 – Enforcement

Chapter 19 – Access Review and Certification

Chapter 20 – Reporting and Monitoring

Chapter 21 – Roles and Rules

Chapter 22 – IAM Product Selection

Chapter 23 – Implementation Case Studies

Product details

  • Edition: 1
  • Latest edition
  • Published: November 26, 2013
  • Language: English

About the author

EO

Ertem Osmanoglu

Ertem Osmanoglu is a Partner and Principal in the Information Technology Advisory Services practice at Ernst & Young's Financial Services Office. He leads the Identity and Access Management practice within Ernst & Young’s Financial Services Office. He has led teams for large global clients with information security, identity and access management, e-business strategy, IT risk management and infrastructure service needs. He has over 18 years experience in the IT field and is the author of Security Architecture: Design, Deployment and Operations (McGraw-Hill 2001).
Affiliations and expertise
Ernst & Young Financial Services