Identity & Access Management

Having worked for over 15 years on Identity and Access Management (IAM) projects, I have noticed that many of these projects only partially met user expectations, that they had many flaws, and that they did not respect the budget and/or the deadline desired by the business teams. Even worse, many security flaws can be traced back to the technical implementation of these infrastructures or to the implementation, or even the design, of business processes.

The post-mortem analysis of some of them allowed me to identify the origins of this lack of quality and to propose a methodology in order to carry out such projects. The broad outlines of this methodology can be adapted to other types of IT projects, only the details of this methodology will be applied to Identity and Access Management (IAM) projects.

In addition, the following topics are also covered:

Notice: You must be registered to get access to the most of the detailed parts of this domain.