Technology & Product Review for Identity Governance & Administration
Case Study #3: Technology & Product Review for Identity Governance & AdministrationCase Scenario:
Research:
- Review the Week 5 readings
- Choose an Identity Management or Identity Governance & Administration product which was mentioned in the readings. Research your chosen product using the vendor’s website and product information brochures.
- Find three or more additional sources which provide reviews for (a) your chosen product or (b) general information about the characteristics of Identity Governance & Administration. Products.
Download Attachment:
CSIA 310 Case Study #3 Identity Governance + Administration v4.docx
Save your time - order a paper!
Get your paper written from scratch within the tight deadline. Our service is a reliable solution to all your troubles. Place an order on any task and we will take care of it. You won’t have to worry about the quality and deadlines
Order Paper NowNorth-by-East Software is a small but growing software development company. A recently completed risk assessment found that the company had very weak controls over the issuance and management of user ID’s and privileged accounts. The risk assessment recommended that the company implement two key controls to mitigate insider threats: least privilege and separation of duties. The risk assessment also highlighted the potential financial losses which could occur due to theft or disclosure of the company’s strategic plans and intellectual property. The company’s Chief Information Officer has recommended that an Identity Governance and Administration (IGA) product be purchased to help implement the required security controls.
As a member of the CIO’s team, you have been tasked to research, review, and recommend an IGA product which, at a minimum, will meet the company’s primary needs (controlling access, implementing least privilege, and ensuring separation of duties). Your product review and evaluation should include additional relevant features and characteristics which could help the company address and manage risks associated with insider threats.