In a world where the best practices for IT change with the seasons, it’s helpful to have tools that can evaluate the effectiveness of your current solutions. That’s what we’re offering with the Identity Management Checklist below.
Few aspects of IT have transformed as much in recent years as the Identity Access and Management (IAM) space. Identities are doing so much more than ever before, providing users access to the ever expanding field of IT resources that range across a variety of protocols, from on-premises to the cloud and back.
An effective IAM strategy means not just better user efficiency and more admin control, but also better security. Identities are also increasingly the target of cybercriminals and must be kept secure at all costs.
The stakes are high, so don’t move forward unprepared. Fill out the checklist below to evaluate your current IAM, to see where you’re proficient and where you have room to improve.
What you should look for as part of your IAM strategy:
- Centralized Management
- Single Sign-On
- Manage by Groups
- Compatible with Windows, Mac, & Linux (Vendor Neutral solution)
- Extensible to SaaS Apps (e.g. Google Apps, AWS)
- Multi-Factor Authentication
- Automatic Password Rotation
- Customizable Password Requirements
- Uses core protocols, such as LDAP, SAML, RADIUS, SSH, REST
- Automated Provisioning & De-Provisioning
How does your current IAM strategy measure up on this checklist?
Count how many of the boxes that you can check to arrive at your score.
Poor (0-4): If you’re in this range, then your IAM strategy is actively hurting your company’s efficiency and security. You probably either don’t have a directory or you need to scrap your existing one. Giving your IAM strategy a makeover should be your top priority.
Fair (4-7): You’re keeping your head above water, but you’re not getting anywhere. Your IAM is either causing lapses in security or incompatibility with critical resources. Survey your needs and consider making a major change.
Good (7-8): If you scored in this range, that means your IAM is serving you well. Still, all it takes is one missing plate in your armor for a hacker to deal a costly strike. Keep reading to find ways to address your IAM’s shortcomings.
Excellent (9-10): Give yourself a pat on the back. You’ve already got a high-functioning IAM. Focus your efforts on staying ahead of the curve and being prepared for the changes coming in the identity market.
In 2018, there’s no excuse for a company’s IAM strategy not to be scoring in the ‘Excellent’ range. That said, there are a host of good reasons why it probably isn’t.
5 Big IAM Challenges Companies Face
- Vulnerable Identities
- Identity Sprawl
- Legacy Systems (e.g. Microsoft Active Directory)
- Shadow IT
- Vendor Lock-In
If you’re dealing with any of the five big roadblocks above, then consider checking out The Guide to Identity Management 2020.
If you’re looking for a more ‘turn-key’ solution (but one that doesn’t take any shortcuts), then I recommend a cloud identity management service, such as a DaaS. This can also be referred to as SaaS-based Identity management or Identity-as-a-Service.
Is Your Business a Good Candidate for DaaS?
At JumpCloud, we offer an innovative approach to Identity and Access Management that we call Directory-as-a-Service® or DaaS.
DaaS is a cloud based directory that centralizes identities, giving IT admins unprecedented control over their users and IT resources from one location. There’s no maintenance required and getting started can be as simple as importing your existing users from AD or even from Google Workspace (formerly Google Apps and G Suite™).
A quick run-down of some more DaaS features:
With our emphasis on security (including MFA and stringent identity encryption), along with a vendor-neutral, multiprotocol ethos that spans operating systems (including Mac and Linux!), JumpCloud’s DaaS is a powerful tool to add to any IT admin’s arsenal.