Integration Prioritization Model for Identity Access Management

Subscriber Content
Screenshot of the first page of Integration Prioritization Model for Identity Access Management
How to Prioritize Applications for Identity Access Management Integration Using a Simple Model

Most identity access management (IAM) products and services don’t provide real value until they are integrated with applications. And while today’s IAM leadership spends significant resources on these integrations, prioritization can be difficult. However, a formal IAM prioritization model ensures alignment with corporate priorities and allows transparency with stakeholders, and it does not need to be complex.

Protiviti recommends a simple prioritization model based on risk, impact and friction. The model described in this article shows the criteria used to evaluate applications in each of these areas, as well as a starting point to determine the relative weight of these drivers.

Free Trial

Sign up for a free, no-obligation trial to start exploring our timesaving, valuable resources.