© Morey J. Haber, Darran Rolls 2020
M. J. Haber, D. RollsIdentity Attack Vectorshttps://doi.org/10.1007/978-1-4842-5165-2_12

12. Identity Management Program Planning

Morey J. Haber1  and Darran Rolls2

Over the years, we’ve seen what makes organizations successful and, sometimes more interestingly, not so successful, when dealing with large-scale Identity Governance projects. We often get asked to leverage these experiences to shape customers’ identity management strategy and provide a blueprint for success. This chapter outlines some of our observations and recommendations to get you thinking about the basic necessities that form the foundation of an effective identity management strategy.

Program vs. Project ...

Get Identity Attack Vectors: Implementing an Effective Identity and Access Management Solution now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.