The methodology that CyberIAM believes in when approaching a project rests on 6 systematic pillars:
Analysis, Plan, Design, Build, Test and Deploy.
How do we analyse your IAM needs?
An analysis is a key part and starting point of any IAM project. During an analysis we look at your current implemented IAM infrastructure and processes to assess your readiness as well as the level you stand on with this infrastructure.
The analysis begins when our CyberIAM Principal Consultants and Business Analysts meet with department heads of HR, IT and Security. They will spend time on the customer’s site reviewing day to day process and working practices to gain a high level of understanding about the clients functional and non-functional requirements. They look into the size, volume and value of the project, the various applications that need onboarding, IT infrastructure environment and platforms as well as barriers to deployments such as lack of processes or process change.
In order for CyberIAM to Analyse your needs we recommend the following:
1. A meeting with CyberIAM Principal Consultants and Business department heads of HR, IT and Security.
2. An on-site assessment with a CyberIAM Business Analyst.
3. We then evaluate your existing process and recommend improvements to enhance performance and deployment.
Modern Implementation Plans
CyberIAM prefers to use a more modern implementation Plan which is based on Agile methodology. This allows us to break down complex requirements that are usually delivered over a 4-6 week period into smaller deliverables. We are then able to deploy code faster, keep the testing focused and reduce any scope creep that usually slows down deployment.
Even though the implementation of certain software solutions requires a Waterfall approach, we still try to incorporate agile practices to keep the project’s momentum fast and efficient.
The Agile Method is a particular approach to project management when working with software development and roll out. This method assists project teams in responding to the complexity and unpredictability of rolling out Identity Access Management software solutions. Agile uses incremental, iterative work sequences that are commonly known as sprints.
A sprint is a period of time allocated for a particular phase of a project. Sprints are considered to be complete when the time period expires. There may be disagreements among the members of the team as to whether or not the development is satisfactory; however, there will be no more work on that particular phase of the project. The remaining phases of the project will continue to develop within their respective time frames.
The Agile approach has helped deliver IAM projects that CyberIAM have led or been involved in quicker. The approach also produces fast results, where previously a project had been stalled for months or even years.
Consultancy Lead Design
The Design of any IAM project is key to its success and quick deployment. This is why CyberIAM deploy our Principle Consultants that all have a minimum of 10 years’ experience working with some of the largest organisations in the world: ensuring the technical success of their IAM technologies.
The Principal Consultant will meet with department heads of HR, IT and Security. They will spend time on the customer’s site reviewing day to day process and working practices to gain a high-level of understanding about the clients functional and non-functional requirements. This will drive the high-level design followed by the detailed design done in conjunction with the Principal Consultant, the Architect, and key stakeholders.
The IAM infrastructure design takes into account the number of users, end-user applications, roles and entitlements within the applications of the business. Based on these numbers most IAM products provide deployment options we strictly adhere to and will assist with a smooth system roll out.
Building Your IAM infrastructures
Reducing the time and effort it takes to onboard applications is essential to any IAM project. Traditionally, Identity governance integration can take many weeks per application, however, our CyberIAM consultants have decades of experience in onboarding applications and building IAM infrastructures.
We utilise a phase approached, and applications usually fall under three categories Read/Write, Read and Unconnected. The number of applications onboard in a phase depends on multiple factors like the type of connectors and criticality of the application.
Testing now to save later
Testing is an important part of the IAM solution build because software bugs could be expensive to fix at a later date or even leave gaps in your processes and security. Software bugs can potentially cause monetary and loss of data if they are not found during testing.
Unit testing is done by CyberIAM developers followed by functional testing. The testers test the different permutations of the role-based access to the IAM system.
– Requests for access
– Requests for multiple access
– Manager approvals
– Manager rejects
– Role approvals
– Role rejects
A CyberIAM Business Analyst will support the customer to develop UAT scripts and support them through the UAT test cycle. A scripting or script language is a programming language that supports scripts — programs written for a special run-time environment that automate the execution of tasks that could alternatively be executed one-by-one by a human operator.
Let's Go Live
CyberIAM follows best practice for the deployment of the specific IAM solutions provided by the software vendor. Based on the organisation we may compliment this by creating an automated deployment process using the latest standards in agile deployment. Some organisation who like control over production releases will be provided with a detailed guide with steps to allow the client to perform there own production release.
When the customer approves we can set up a VM environment in our labs. We can also test any patches or upgrades in-house before redeployment and or upgrades.
CyberIAM Holdings Limited provides the expertise needed for the design and implementation of complex Identity and access management systems.
Products we deliver
CyberIAM offers a wide range of products that we deliver to our customers. These products include: Sailpoint, Ping and CyberARK software.