diff_months: 4

Implementbestpracticesforidentitymanagement ICTCYS604

Flat 50% Off Order New Solution
Added on: 2025-05-14 04:43:00
Order Code: LD526247
Question Task Id: 0

ICTCYS604

Implementbestpracticesforidentitymanagement

ProjectPortfolio(Explanatory Document)

Studentname:

Studentmustinclude.

StudentID:

Studentmustinclude.

Date:

Studentmustinclude.

Business this assessment isbased on:

Studentmustinclude.Thiswillbethecasestudybusinessprovided.

Section1:Analysis

Identitymanagementpractices

Identifyandsummarisethe

organisationscurrentidentify

managementpractices.

Identifyriskassociatedwiththecurrent identify management systemor lack of it.

Thestudentmustidentifyandsummarisetheorganisationscurrentidentify

management practices. This may include:

AbouttheGrowManagementConsultancyandtheirbusinessplans.Talkabout the problem of not having an identity management system and associated risks ofit.Explainhowthatidentitymanaagementsystemisimportantintheprocessof exxplaandingtheirbusiness.

Identify identity management environment, processes and requirements

Identifyandsummarisethe

organisations identity management environment, processes relevant toidentitymanagementandkeyrequirementsforidentitymanagement.

The student must identify and summarise the organisations identity management environment, processes relevant to identity management and key requirements for identitymanagement.

Thismayinclude:

The student should describe the identify management environment which in effect currentlyisfairlylimitedduetothefactthatthereisnostrategyinplace.

Eplain the importance of introducing an identity management system due to the organisations expansion plans and the increasing risk of cyber security issues.

Identify the weakness of the exisiting security policy regards to this identity management system.

Legislationandindustryrequirements

Research and identify legislation andindustry requirements relevant to implementing best practices foridentifymanagement.

Identifyatleastonerelevantlegislation andone industryrequirement and summarise yourfindings.

Thestudentmustresearchandidentifylegislationandindustryrequirements

inAustraliarelevanttoimplementingbestpracticesforidentifymanagement.

Section2:Identifymanagementbestpracticeanddesign

Identitymanagementsoftware

Firstofallyoushouldresearchandaccessstateoftheartidentitymanagement software that could be used by the case study organisation.

You can use the link to access freeidentify management software.

Choose one to access and thendocumentitskeyfeaturesandbenefits:

https://www.capterra.com/identity-management-software/s/free/

Thestudentmustidentifyidentitymanagementsoftwareoftheirchoiceandthen

identifythesoftwareskeyfeaturesandbenefits.

Thiswillbedependentonthesoftwarethestudentchooses.

Vision

Describetheoverallgoaloftheidentify management plan, as well asspecificobjectives.

This may be any goal/objectives ofyourchoicethatalignswithbest practice.

Thestudentmustdescribetheoverallgoalandkeyojectivesoftheidentify management plan, as well as specific objectives as given in the case study organi- sation.

Keyactions

Describeatleastfivekeyactionsto achieve identify management bestpractice. For each action include the timeline and resource requirements, as well as performance benchmarks.(Examplegiven)

Action

Timeline

Resourcerequirements

Identify and implement a cloud-based system that includes a robust identity managementsystem

Immediate

Budget

ITManager

Benchmarks

Describe the benchmarks that will beusedtoassesstheeffectiveness of identify management practices.

Referthecasestudyandidentifybenchmarkswillbeusedtoassessthe effectiveness of the identity management performance after 6 months of imple- mentation.

Implementationstrategy

Describe how you will implement yourstrategy.

The student must describe how they will implement their identity management systemintheorgaanisation. As an eample, first of all, they have to present that to the staff.

Presentation

Develop your presentation and include the title of your presentationhere. Attach your presentation to yourPortfolio.

Forexample,IdentifyManagementStrategyPresentation.

Insertslidesofthatprsentationhere.

Section3:Identifymanagementstrategyfinalisation

Finalise your identify management best practices plan.

Identifymanagementperformance

Provideananalysisofthe

organisations performance against atleast two of the best practices youhaveincludedinyourplan.

Based on your review, what do youconsideraretheareasofhighrisk andvulnerability?Describethese.

Thestudentmustprovideananalysisoftheorganisationscurrentperformance

against at least two of the best practices included in their plan. This may include:

A review of the information shows that there areongoing and numerous problems despitetheimplementationoftheIdentifyManagementStrategy.

LostUserProductivity:Newusersloseproductivityandtimeastheywaitfor accounts to be created. Delaysinusers ability to access resourcesoften result when manual, paper-based workflows and approvals cannot be streamlined or easily orchestrated. There can often be lengthy wait times for users to gain access toresourcestheyneed,andhavetheright,toaccess.Clearlytheaccess management strategy is not working.

PoorUserExperience:Issuingandmanagingmultipleuseraccountsand passwords to support access to different applications and resources results in user confusionandfrustration.Clearlytheaccessmanagementstrategyisnotworking.

Limited Information Sharing Across Applications: Applications are unable to share information that should be shared, such as contact information, files, and common dataforcalendarsandotherfrequentlyusedfunctions.Clearlytheaccess management strategy is not working.

Unnecessary Administrative Overhead: The high volume of calls to the IT help deskto address basic account or application management functions, such as password management, creates an unnecessary burden on support staff.Clearly the access management strategy is not working.

Theseriskspresentmultipleareasofhighriskandvulnerability.

Planupdate

Based on your review above, what remediation strategy would yousuggest to address the areas of highriskandvulnerability?Documentatleasttwoactionshere.

The student must identify and summarise the organisations identity management environment, processes relevant to identity management and key requirements for identitymanagement.

Thismayinclude:

Additional training on the systemto ensure that staff fully understand and can implementthesystem.

Working with the software develop to check that the system has been implemented correctly.

Submission

Develop an email summarising theinformation included in your Portfolioandaskingforfeedback.

Your assessor will provide you withfeedbacktowhichyoushouldalsorespond to below.

The student must develop an email summarising the information included in their Portfolio and asking for feedback.

This will be dependent on the information they have developed. This may include:

DearAssessor

I have completed a comprehensive Identity management strategy, as well as an implementation strategy. I believe this will be a comprehensive strategy to take us forward with our business growth.

Pleasereviewandprovidefeedback.

Feedback

What feedback did your assessorprovideyouwith.Whatisyourresponse?

Thiswillbespecifictothefeedbackprovided.

  • Uploaded By : Nivesh
  • Posted on : May 14th, 2025
  • Downloads : 0
  • Views : 95

Order New Solution

Can't find what you're looking for?

Whatsapp Tap to ChatGet instant assistance

Choose a Plan

Premium

80 USD
  • All in Gold, plus:
  • 30-minute live one-to-one session with an expert
    • Understanding Marking Rubric
    • Understanding task requirements
    • Structuring & Formatting
    • Referencing & Citing
Most
Popular

Gold

30 50 USD
  • Get the Full Used Solution
    (Solution is already submitted and 100% plagiarised.
    Can only be used for reference purposes)
Save 33%

Silver

20 USD
  • Journals
  • Peer-Reviewed Articles
  • Books
  • Various other Data Sources – ProQuest, Informit, Scopus, Academic Search Complete, EBSCO, Exerpta Medica Database, and more