Over the years, we’ve seen what makes organizations successful and, sometimes more interestingly, not so successful, when dealing with large-scale Identity Governance projects. We often get asked to leverage these experiences to shape customers’ identity management strategy and provide a blueprint for success. This chapter outlines some of our observations and recommendations to get you thinking about the basic necessities that form the foundation of an effective identity management strategy.
12. Identity Management Program Planning
Get Identity Attack Vectors: Implementing an Effective Identity and Access Management Solution now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.