Skip to main content

Five Steps to Ensuring a Successful Identity and Access Management Solution Deployment

November 29, 2017

After endless cost-benefit meetings, business case rewrites and months of organizational readiness activities, your identity and access management (IAM) project is funded, has a staff and a start date.  You did everything possible from an organizational readiness perspective to prepare and ensure conditions were set to achieve maximum value. Now you are ready to deploy the solution, and following these five steps can help your organization have a successful project launch.

IAM Depolyment

  1. Ensure the executive sponsor stays engaged throughout the project to help keep the effort on track and within scope, and reinforce expectations. Hopefully s/he is also the identity program champion, tying the project to the identity strategy. Regardless if the sponsor is an information technology or line of business executive, make sure you’ve built an active role for them. Unless the project has a visible, committed executive with decision-making power, when those unforeseen policy issues arise (they always do in IAM efforts) or when a critical target system owner decides not to clean up bad data, you won’t have the muscle when you need it.
  2. Embrace the features of your IAM application. The Pareto principle is best applied: 80 percent of the functionality in the deployment should be standard functionality of the product, 20 percent should be customized functionality. Over-customization is challenging to maintain, especially if your IAM and security staff are inexperienced with the product. You may find that a capability you heavily customized in the current release breaks when you upgrade to the next release of the product.
  3. Don’t do too much too soon. Ensure the to-be-built solution stays in line with the project roadmap and scoped requirements. Too often with IAM efforts, stakeholders want to address every audit finding and inefficiency in a “big bang” approach, even trying to add requirements after the project begins (suggestion: use your executive sponsor to control this). Two drawbacks with this approach are that it takes too long to implement any usable value (average IAM efforts can last 26 weeks), and it doesn’t allow the staff to become comfortable with the IAM application in increments. By phasing your IAM project and delivering incremental functionality, the stakeholders will see value quicker, your staff will build proficiency, and you can identify gaps in the next phase.   
  4. If you missed a readiness imperative, don’t succumb to the easy route of automating a bad processes, tolerating incomplete data or dropping a key functional requirement. Engage the executive sponsor to reset expectations, assess the risk to the IAM strategy and develop alternative solutions (remember, that’s why you’re phasing this). You don’t want to find you can’t execute compliance audits (the reason you bought the product) because your role or entitlement structures are incomplete.   
  5. Make sure you know how this deployment will be supported after it ends, before it even begins. Training, hiring and on-boarding should have commenced right after the business case and budget were approved, but if you missed it, don’t ignore. IAM resources are in high demand. Nothing causes a project to be viewed as a failure faster than realization the staff can’t use the application or the solution isn’t sustainable in the long run.

If you’re not sure how to proceed, invest in an IAM roadmap or deployment service. These efforts can provide leadership with insight on how to ensure IAM solution deployment success.

    Tony Naples

By: Tony Naples

Service Delivery Manager, SailPoint

See More

Related Blogs

November 15, 2017

Five Steps to Preparing for a Successful Identity and Access Management Solution Deployment

As adoption of the Internet of Things (IoT) continues at an incredible pace, organizations of all sizes are shifting away from traditional notions of ...

See Details

January 16, 2018

The Fundamentals of Identity and Access Management

Identity and access management (IAM) is an exciting world filled with dreams of business enablement while reducing risks and implementing security pol...

See Details

May 23, 2016

Next Generation Identity and Access Management (Next Gen IAM)

Having spent the last 17 years in the identity and access management (IAM) space, I know two things are certain: Evolution is inevitable, and change i...

See Details

How Can We Help?

Let us know what you need, and we will have an Optiv professional contact you shortly.

Privacy Policy

Related Insights

July 21, 2015

Network Security Solutions

Learn how we help protect your environment while maintaining connectivity.

See Details

July 21, 2015

Data Security Solutions

Learn how we can help secure your date throughout its lifecycle.

See Details

January 26, 2018

Identity and Access Management Solutions

We help you minimize risk and maximize efficiency with our IAM solutions.

See Details

Stay in the Know

For all the latest cybersecurity and Optiv news, subscribe to our blog and connect with us on Social.


Join our Email List

We take your privacy seriously and promise never to share your email with anyone.

Stay Connected

Find cybersecurity Events in your area.