For the best web experience, please use IE11+, Chrome, Firefox, or Safari

One Identity Maturity Survey

Identity and access management (IAM) is at the frontlines of security and compliance. However, often IAM stands as a barrier to achieving organizational objectives. Answer these six (6) IAM assessment questions to determine where your IAM program is performing well and where you can improve.

printer

Survey

1

On average how long does it take for a new hire to be FULLY provisioned to all applications and systems they need to do their job?

2

What percentage of your identity lifecycle management tasks (joiner, mover, leaver) require IT intervention?

%
3

How many different passwords does your typical user have to access enterprise resources (not personal resources)

4

Approximately what percentage of your total IAM workload involves Active Directory and/or Azure Active Directory?

%
5

How confident are you that all your privileged accounts (including service accounts and 3rd party access) and administrator activities are controlled, monitored, recorded and secured, with individual accountability?

6

How equipped do you feel your identity and access management program is to deal with change (such as M&A, digital transformation, new applications or user populations, new regulations, Shadow IT, etc.)?

Overall IAM Maturity Score

IAM is many different things and what matters to one organization may not be as important to another. This score is meant to quantify your position for the most common IAM challenges.

0

Identity Lifecycle Management Maturity Score

Identity lifecycle management (often called provisioning or joiner/mover/leaver) is the lynchpin to any successful IAM program. Generally all organizations struggle with identity lifecycle management to some extent, with complexity and change being the biggest culprits.

0

Access Management Maturity Score

Access management are the IAM workloads that are most apparent to the end user. It includes password management, single sign-on, and unified access to heterogeneous resources. Most organizations have achieved maturity in pockets of access management while additional areas may remain problematic.

0

Privileged Access Management Maturity Score

Privileged access management encompasses the practices and technologies you put in place to ensure that administrative accounts (such as root or Admin) are controlled, audited, secured, and that you can assign individual accountability to administrator activities while detecting inappropriate activities. This is the fastest growing IAM discipline and is central to security and compliance initiatives.

0

IAM Adaptability Maturity Score

The ability to adapt to change is often the Achilles Heel of IAM programs. Mergers and acquisitions, digital transformation in the form of an influx of new cloud-based computing resources, and an increasingly mobile workforce all can stretch an otherwise successful IAM program to its breaking point.