Identity, Credentials and Access Management (ICAM)

  • Consulting to the CIOs Identity and Access Management, e-Authentication, ICAM and HSPD-12.
  • As-Is and Target ICAM Architecture and integration with infrastructure.
  • Recommendations, proposed system functional requirements and design documents.
  • Account Management and authoritative data sources.
  • Security strategy, roles assignment and account processes, security and recertification compliance, management of data, and role request across the enterprise.
  • Analysis and evaluation of On-Boarding, Off-Boarding, Access Management, Provisioning, Privileged Accounts, internal and external users.
  • Requirements gathering and assessment enterprise issues and bottlenecks. 
  • Design, Selection Criteria, Interfaces for PIV, SSO, Federation and certificates.