One of the fundamental issues in promoting IGA program is showing the value for business, C-level leadership and board of directors. One of the measured metrics of every organization is operations efficiency centered around business task executions. Performing the task requires set of permissions and sequence of actions allowed by these permissions.
In this session, we will introduce the new approach of building IGA program business by presenting task-based identity governance, i.e. access controls around tasks in hands. We will discuss the models, formulas and suggestions how to implement this approach in your current day-to-day IAM/IGA operations along with use case examples. We will discuss discovering gaps in business needs definitions around entitlements (NPR report), complex IDT (identity (human and NHI)-devices-target) paths illustrating task workflow process, USA (update-simulate-analyze) methodology of preparation for task execution and fulfillment (Zero Standing Privileges). We will also show advantages of switching to task-based provisioning vs. typical access request process from cost and risk standpoint.
All of the above will create a real business value for your IGA program and help you with getting more recognition in your organization.