Implementbestpracticesforidentitymanagement ICTCYS604
- Subject Code :
ICTCYS604
- University :
Harvard University Exam Question Bank is not sponsored or endorsed by this college or university.
ICTCYS604
Implementbestpracticesforidentitymanagement
ProjectPortfolio(Explanatory Document)
Studentname: |
Studentmustinclude. |
StudentID: |
Studentmustinclude. |
Date: |
Studentmustinclude. |
Business this assessment isbased on: |
Studentmustinclude.Thiswillbethecasestudybusinessprovided. |
Section1:Analysis
Identitymanagementpractices Identifyandsummarisethe organisationscurrentidentify managementpractices. Identifyriskassociatedwiththecurrent identify management systemor lack of it. |
Thestudentmustidentifyandsummarisetheorganisationscurrentidentify management practices. This may include: AbouttheGrowManagementConsultancyandtheirbusinessplans.Talkabout the problem of not having an identity management system and associated risks ofit.Explainhowthatidentitymanaagementsystemisimportantintheprocessof exxplaandingtheirbusiness. |
Identify identity management environment, processes and requirements Identifyandsummarisethe organisations identity management environment, processes relevant toidentitymanagementandkeyrequirementsforidentitymanagement. |
The student must identify and summarise the organisations identity management environment, processes relevant to identity management and key requirements for identitymanagement. Thismayinclude: The student should describe the identify management environment which in effect currentlyisfairlylimitedduetothefactthatthereisnostrategyinplace. Eplain the importance of introducing an identity management system due to the organisations expansion plans and the increasing risk of cyber security issues. Identify the weakness of the exisiting security policy regards to this identity management system. |
Legislationandindustryrequirements Research and identify legislation andindustry requirements relevant to implementing best practices foridentifymanagement. Identifyatleastonerelevantlegislation andone industryrequirement and summarise yourfindings. |
Thestudentmustresearchandidentifylegislationandindustryrequirements inAustraliarelevanttoimplementingbestpracticesforidentifymanagement. |
Section2:Identifymanagementbestpracticeanddesign
Identitymanagementsoftware Firstofallyoushouldresearchandaccessstateoftheartidentitymanagement software that could be used by the case study organisation. You can use the link to access freeidentify management software. Choose one to access and thendocumentitskeyfeaturesandbenefits: https://www.capterra.com/identity-management-software/s/free/ |
Thestudentmustidentifyidentitymanagementsoftwareoftheirchoiceandthen identifythesoftwareskeyfeaturesandbenefits. Thiswillbedependentonthesoftwarethestudentchooses. |
||||
Vision Describetheoverallgoaloftheidentify management plan, as well asspecificobjectives. This may be any goal/objectives ofyourchoicethatalignswithbest practice. |
Thestudentmustdescribetheoverallgoalandkeyojectivesoftheidentify management plan, as well as specific objectives as given in the case study organi- sation. |
||||
Keyactions Describeatleastfivekeyactionsto achieve identify management bestpractice. For each action include the timeline and resource requirements, as well as performance benchmarks.(Examplegiven) |
Action |
Timeline |
Resourcerequirements |
||
Identify and implement a cloud-based system that includes a robust identity managementsystem |
Immediate |
Budget ITManager |
|||
Benchmarks Describe the benchmarks that will beusedtoassesstheeffectiveness of identify management practices. |
Referthecasestudyandidentifybenchmarkswillbeusedtoassessthe effectiveness of the identity management performance after 6 months of imple- mentation. |
||||
Implementationstrategy Describe how you will implement yourstrategy. |
The student must describe how they will implement their identity management systemintheorgaanisation. As an eample, first of all, they have to present that to the staff. |
||||
Presentation Develop your presentation and include the title of your presentationhere. Attach your presentation to yourPortfolio. |
Forexample,IdentifyManagementStrategyPresentation. |
||||
Insertslidesofthatprsentationhere. |
Section3:Identifymanagementstrategyfinalisation
Finalise your identify management best practices plan.
Identifymanagementperformance Provideananalysisofthe organisations performance against atleast two of the best practices youhaveincludedinyourplan. Based on your review, what do youconsideraretheareasofhighrisk andvulnerability?Describethese. |
Thestudentmustprovideananalysisoftheorganisationscurrentperformance against at least two of the best practices included in their plan. This may include: A review of the information shows that there areongoing and numerous problems despitetheimplementationoftheIdentifyManagementStrategy. LostUserProductivity:Newusersloseproductivityandtimeastheywaitfor accounts to be created. Delaysinusers ability to access resourcesoften result when manual, paper-based workflows and approvals cannot be streamlined or easily orchestrated. There can often be lengthy wait times for users to gain access toresourcestheyneed,andhavetheright,toaccess.Clearlytheaccess management strategy is not working. PoorUserExperience:Issuingandmanagingmultipleuseraccountsand passwords to support access to different applications and resources results in user confusionandfrustration.Clearlytheaccessmanagementstrategyisnotworking. Limited Information Sharing Across Applications: Applications are unable to share information that should be shared, such as contact information, files, and common dataforcalendarsandotherfrequentlyusedfunctions.Clearlytheaccess management strategy is not working. Unnecessary Administrative Overhead: The high volume of calls to the IT help deskto address basic account or application management functions, such as password management, creates an unnecessary burden on support staff.Clearly the access management strategy is not working. Theseriskspresentmultipleareasofhighriskandvulnerability. |
Planupdate Based on your review above, what remediation strategy would yousuggest to address the areas of highriskandvulnerability?Documentatleasttwoactionshere. |
The student must identify and summarise the organisations identity management environment, processes relevant to identity management and key requirements for identitymanagement. Thismayinclude: Additional training on the systemto ensure that staff fully understand and can implementthesystem. Working with the software develop to check that the system has been implemented correctly. |
Submission Develop an email summarising theinformation included in your Portfolioandaskingforfeedback. Your assessor will provide you withfeedbacktowhichyoushouldalsorespond to below. |
The student must develop an email summarising the information included in their Portfolio and asking for feedback. This will be dependent on the information they have developed. This may include: DearAssessor I have completed a comprehensive Identity management strategy, as well as an implementation strategy. I believe this will be a comprehensive strategy to take us forward with our business growth. |
Pleasereviewandprovidefeedback. |
|
Feedback What feedback did your assessorprovideyouwith.Whatisyourresponse? |
Thiswillbespecifictothefeedbackprovided. |