Audit and analysis of identity and access management

This analysis, carried out by an expert, will allow you to take a step back from your identity and access management process and identify areas for improvement based on best practices.

Contact us
Objectives
  • Help understand current identity and access management
  • Provide recommendations for improvement
  • Define a target architecture
Methodology
  1. Data flow workshops
  2. Study of data flows between applications
  3. Study of manual data flows
  4. Lifecycle workshops
  5. Study of the lifecycle of an account, from creation to archiving
  6. Comparison with the implementation of account lifecycles in other public institutions or establishments
  7. Implementation of good identity and access management practices
  8. Data migration workshops
  9. Study of existing data
  10. Study of the standardization of this data with respect to the Supann standard (ESR)
Deliverables

Analysis document of current identity and access management and recommendations on the improvements to be made as a priority.

Next steps

Discover all of our associated services:

Expression of need

Expression of need is an essential process for defining the expectations and requirements of a project.

Modernization of your identity and access management

Definition of functional and technical specifications, deployment and configuration of services.

Training courses

Follow our training courses to acquire best practices for administering identity and access management services.