Abstract
Abstract. This article discusses some of the Information Technology account provisioning issues currently faced by small- and medium-sized businesses and lays out a strategy for a streamlined provisioning process. These will be the first steps required to move toward automating the provisioning process with an Identity Management strategy.
Notes
“Excessive access creates the potential risk for people to make uncontrolled changes to critical systems.”
“Access to Systems should be based on a business need and only personnel who are formally authorized should have access.'
“A ghost account is an account that should not remain active on a System but is.”
“By having an accurate and complete picture of a user's entitlements, it will be a much easier process to track the removal of a user's accounts and track the return of assets.”
“The Authoritative Source is a single repository that is considered the primary location that contains the most accurate information about a user's identity.”
i. Gene Kim, Paul Love, and George Spafford, Visible Ops Security: Achieving Common Security and IT Operations Objectives in 4 Practical Steps (IT Process Institute Inc., 2008), p. 34.
ii. Gerry Gebel, Identity and Privacy Strategies—Reference Architecture Template - Provisioning Services (Burton Group, 2009), p. 3.
iii. Ibid., p. 7.
iv. Kim, Love, and Spafford, p. 35.
v. Ibid., p. 34.