shutterstock_739241962.jpg

CUSTOMER CASE

Assisted clean-up 

of access issues

Improve your IT risk posture

Summary

As for many organizations, one of the main challenges of our client, active in the manufacturing industry, was to keep up with the rapid changes in the application and employee landscape. Over the years this has led to an accumulation of access issues that our client was determined to take care of.

 

They were aware of the fact that they had some issues lingering around, but the task of cleaning them up was too overwhelming. In addition, their current tools and systems did not give them the insights they needed to get started, nor to follow up on the progress. 

 

Instead of randomly cleaning up issues, we used our platform in order to apply a risk-based, data-driven and iterative approach, enabling our client to see value, in terms of risk reduction, immediately. In addition, we put monitoring and alerts in place to help them follow up and prevent another build-up of access issues.

 

Approach

  • Iterative: By choosing manageable chunks of access issues to clean up, we avoid a big bang approach and enable a quick-win approach. Quick wins, in terms of signs of improvement, stimulate motivation and secure support from management.

  • Risk-based: Each iteration starts with identifying those access issues that entail the biggest risk. We aim for maximal and immediate risk reduction by addressing the biggest access risks first.

  • Data-driven: We put the identity to work in every step: to identify, to act and to transform. This enables for a cost-efficient and intuitive way of addressing access issues.

 

3 Step Approach

1. 

Identify: Typically, a cleaning project follows an assessment - for which identity data from the most important applications gets imported in our platform. This was also the case for our client. Performing the assessment, using our platform, allowed us to quickly discover the various access issues that were present in our client’s IT environment and assess the risk that each of those entailed. Based on that risk-prioritization the client decided on the scope of the first clean-up iteration: orphaned accounts.

2. 

Act: Starting to clean up all orphaned accounts was still quite overwhelming. So, within those orphaned accounts we made another prioritization based on risk and effort: focussing first on those accounts that entailed the greatest risk but required the least effort to clean up. This prioritization was then used to define subgoals, enabling risk reduction fast (see figure below). One of the first subgoals was cleaning up 80% of the privileged orphaned accounts.

With extensive analytics capabilities, our platform assisted our client in finding which accounts to remove or which team lead to address in case of doubts. We built dashboards specifically to follow up on the progress that was being made. Burndown charts, for example, helped our client to see whether the situation was improving and whether they would achieve their goals, enabling them to make timely adjustments if necessary.

3. 

Transform: Besides dashboards to follow up on the progress we also set up alerts to avoid backsliding after the clean-up iteration. Because it’s not as if orphaned accounts would never come back. With the alerts, we gave our client the ability to automatically detect these so action could be taken before they started to pile up again.

 

Result

We used our platform to enable an iterative, data-driven and risk-based approach to cleaning up access issues, enabling our client to establish quick wins and see value in terms of risk reduction immediately. 

 

Our client now uses our platform to follow up on the progress that they make, monitor the remaining access issues, and get the insights they need to continue the next clean-up iterations. Next scope: access accumulation.

 

Impact

Our client significantly improved their IT risk posture by dealing with the access issues in a focussed and achievable way. Seeing the progress they were making kept the motivation going and the business engagement strong, enabling them to reach higher with every iteration. 

 

Other cases

shutterstock_305076497.jpg

EMPOWER

Empowering 500+ IAM professionals to take better access decisions

Give everyone involved in IAM access to the information they need

In an enterprise many people have to make access decisions, but all too often they are only given limited information to support decision-making. To alleviate this, we helped our client bootstrap a data analytics program specifically for identity and access management.

shutterstock_1172652481.jpg

UNDERSTAND

Data-driven and incremental approach to SoD

Cost-effective implementation of SoD policy

Defining separation of duty (SoD) rules is traditionally a cumbersome process. Instead, we applied a fundamentally new approach to SoD and provided our client with a first set of SoD rules in just a few weeks.

shutterstock_525921169.jpg

AUTOMATION

Designing a role model in 2 days instead of 12 months

A cost-effective approach to role model design

To help our client assign access rights in a more structured way, we provided our client with a suitable role model in just 2 days by applying a data-driven and iterative approach.

THE IDENTITY INTELLIGENCE COMPANY

Looking for help? Get in touch with us

MAIL US

info@elimity.com

We are happy to answer!

CALL US

Global offices

EU +32 474 907 266
UK +44 2071 297 069

FIND US

Corporate Headquarters

Motstraat 30

2800 Mechelen

Belgium

© 2021 Elimity NV. All rights reserved. Elimity, the Elimity logo and all techniques are trademarks or registered trademarks of Elimity NV, in the EU and/or other countries.
All other products or services are trademarks of their respective companies.