Identity Governance Product Briefs

Omada Identity Maturity Model

Identity Governance is a Journey

Download

Managing identities across an increasingly complex IT landscape takes more than just technology. With an ever-growing number of identities (human and non-human), an explosion in SaaS applications, sensitive customer data, and ever-evolving cloud computing choices, organizations need to be more diligent than ever in how they manage, protect, and enable their workforce. However, any identity and access management (IAM) program needs to evaluate more than just technology. Particularly, identity governance and administration (IGA) will require a defined strategy, standardized processes, and quality data to scale.

 

Identity Governance is a Journey

In deploying IGA, there are a variety of stakeholders to consult, and success factors to track when moving up the IGA maturity model. Omada Identity Maturity lays out the groundwork for introducing IGA and moving along the journey to master identity governance and administration. To help illustrate the journey, Illustration 1 breaks this down and highlights three constituencies and their primary focus, Compliance, Security and Risk, and IT Efficiency.

omada identity maturity model

Illustration 1: Maturing IGA use cases

 

Maturity Stages

The Omada Identity Maturity model consists of 5 stages: Operational, Controlled, Governed, Responsive, and Optimized. The customer journey towards maturity commences with establishing prerequisites in the environment. Once prerequisites are established, the IGA journey can execute the Operational stage and then proceed through in order to the Optimized stage. Omada offers an onramp that can quickly bring them to the Controlled stage using the Omada Accelerator package.

Kickoff: Prerequisites (Target Timeframe: first month)

This kickoff helps to establish the prerequisites that each stage requires and marks the initial phase in the journey where Omada Identity becomes active with authoritative data (typically an HR solution) and a joined Active Directory. The customer is enabled for fast value implementation with aligned expectations and responsibilities based on a standard Customer Success service package, which includes defined priorities for a customer specific value roadmap.

Stage 1: Operational (Target Timeframe: 3rd month)

In the Operational stage, priority system(s) are onboarded according to standard Customer Success service package(s), and complete data reconciliation is established. Key customer personnel have acquired foundational and operational competencies. Basic IGA (Identity Governance and Administration) processes are configured to improve efficiency and compliance.

Stage 2: Controlled (Target Timeframe: 4th month)

The Controlled stage involves expanded logical configuration with best practices on the application layer and roles, enabling customers to further expand and maintain applications. Enterprise role modeling and basic enterprise roles (birthrights and organization) are introduced, and the customer is empowered to incrementally deploy roles. Self-service, like access requests, is introduced for better user management.

Stage 3: Governed (Target Timeframe: 1 year)

At the Governed stage, expansion continues with other critical systems and applications, emphasizing the utilization of best practices role modeling based on job functions and processes. Constraint policies and Separation of Duties are introduced to enhance governance. Self-service and governance procedures are rolled out, including proper approval and re-certification of direct access rights. Integration with process support systems such as ITSM, PAM, CIAM, and GRC is established to maintain customer competencies.

Stage 4: Responsive (Target Timeframe: 18 months)

In the Responsive stage, the focus shifts towards applying classification and risk metrics to roles, policies, and processes, specifically in relation to evaluating identity access rights. Enhanced processes are implemented to handle violations, triggered inspections, re-certification campaigns, and potential security breaches.

Stage 5: Optimized (Target Timeframe: > 24 months)

During the Optimizing stage, the primary goal is to realize the full potential of the IGA solution by enhancing efficiency, compliance, and security. This is achieved through the application of differentiated use cases and system behavior based on identity types, advanced context utilization, and risk calculations.

 

Identity Maturity Activating Core Capabilities

Deploying a modern IGA like Omada Identity Cloud offers organizations the ability to activate more critical capabilities in a methodical, pragmatic way. In the process of maturing your implementation, customers will be securing identity and reducing more risk as they move along the maturity path. Furthermore, the more mature your IGA implementation, the greater the value of Identity Governance you are offering stakeholders across your business teams, your security and compliance teams, and your IT teams.

omada identity maturity model

Illustration 2: Omada Identity Maturity mapped to Omada IGA capabilities

 

Mature Governance of Identity Fabric

Automation and Efficiency Security Risk For most customers, Identity Governance and Access Management can become extremely complex. Omada offers the only full-suite IGA solution that comes with a proven best practice process (Omada IdentityPROCESS+) to successfully deploy. Omada now offers the means to maximize the success of that investment in IGA with Omada Identity Maturity to provide a roadmap for success as you continue to evolve Identity Governance within your organization.

Contact Omada today to learn more about Omada Identity Maturity Model and how to maximize your IGA investment.

 

Let's Get
Started

Let us show you how Omada can enable your business.