logo
Back

Identity & Access Management Maturity Assessment

Estimate your Identity & Access Management Maturity with a targeted assessment and actionable roadmap.

A maturity model can help you boost organizational performance by identifying gaps, setting benchmarks, and setting priorities. Increasing the IAM maturity level of your organization means not only understanding your overall position but also within each tenet of IAM platform.

Complete the assessment to evaluate your organization’s maturity within each IAM capacity and receive actionable steps to scale your strategy.

ACCESS MANAGEMENT
  1. Do you have a centralized store or directory of identities?
  2. Does every human and every non-human have a unique identity in your directory?
  3. Is your directory group structure aligned with your business structure?
  4. Do you use Single-Sign-On to streamline your authentication processes for both on-premise and cloud systems and applications?
  5. Do you use Multi-Factor Authentication (MFA) to provide end users with authentication methods beyond passwords?
  6. Do you securely manage your sensitive authentication information (i.e., keys, passwords)?
IDENTITY ADMINISTRATION
  1. Have you automated feeds of all users into your identity store?
  2. Do you have documented processes for adding and removing accounts?
  3. Have you automated joiner, promoter, mover, and leaver activity in alignment with your business processes?
  4. Have you implemented role-based access controls?
IDENTITY GOVERNANCE
  1. Have you documented and implemented identity and access management policies?
  2. Have you implemented provisioning workflows for your most critical applications?
  3. Do you perform access reviews regularly?
  4. Do you perform access reviews when any access change occurs?
  5. Are your access review and certification processes unique based on the sensitivity and criticality of the in-scope applications?
PRIVILEGED ACCESS MANAGEMENT
  1. Have you implemented a privileged access management (PAM) system to control privileged access?
  2. Do you have a repository of all of your privileged accounts?
  3. Do you have multi-factor authentication (MFA) for privileged account user?
  4. Do you require stronger passwords for privileged accounts than for general user accounts?
  5. Do you maintain regular health checks (change password and security keys) for the privileged accounts?

Thank you for Taking the Assessment

Please provide your information and a brief explanation of your answers to recive your results in a personalized report