Select your cookie preferences

We use essential cookies and similar tools that are necessary to provide our site and services. We use performance cookies to collect anonymous statistics, so we can understand how customers use our site and make improvements. Essential cookies cannot be deactivated, but you can choose “Customize” or “Decline” to decline performance cookies.

If you agree, AWS and approved third parties will also use cookies to provide useful site features, remember your preferences, and display relevant content, including relevant advertising. To accept or decline all non-essential cookies, choose “Accept” or “Decline.” To make more detailed choices, choose “Customize.”

    Listing Thumbnail

    Versent - Identity & Access Management Assessment

     Info
    Sold by: Versent 
    Undertake a current state assessment of Identity & Access Management (IAM) within your organisation leveraging modern trust principles. During this assessment Versent will: • Document a reference architecture, gap analysis. • Develop an action plan for adoption within your ecosystem, aligned to your organisation’s strategic and risk targets. • Develop a data-driven business case identifying key risk and focus areas for the adoption of the IAM action plan to securing internal and external identities and their access to applications and data. Versent’s IAM Assessment (IAMA) is run by our Security & Access Management experts that work with your ICT team to review and assess your ICT estate, processes and skills and align them to best practices.
    Listing Thumbnail

    Versent - Identity & Access Management Assessment

     Info
    Sold by: Versent 

    Overview

    At Versent, our key role is to understand the vision and strategy of our customer, and the associated challenges and opportunities that exist. We have developed a specialised Identity & Access Management review and design methodology that we have merged from traditional architectural processes and the user centred design, into our own ‘Four D’ (Discover, Define, Design and Deliver) process. During our discovery phase, we learn about your business, partners, objectives, employees, related organisations, and customers that you service. We also gather a detailed understanding of the Identity issues and challenges you currently face. A key ingredient of the Versent process is to ‘as early as possible’ engage key stake holders and direct providers and “lighthouse” consumers of the identity solution to ensure any solution proposed is guided by real feedback and insights. We adopt a Contextual Enquiry approach where our Identity experts meet with people and ask pertinent questions to uncover key pain points without “leading the witness” into a specific solution.

    The Design phase is where we design the strategy and vision and define a series of key capabilities and sub-capabilities that are used to define the vision, these are supported by a series of models, including trust, authentication, provisioning, role, and federation models. The current level of maturity for the defined capabilities is then assessed and documented. The target state is then identified and documented, with the required uplift to capabilities identified.

    The Design provides the IAM Reference Architecture that is desirable, viable and feasible. We define a detailed identity component model that solves the identified problems, and addresses Area of Focus. The architecture is also supported by consumption patterns that outline how applications and users consume and leverage the identity ecosystem – a pattern-based approach streamlines future delivery phases through standardisation of onboarding and integration. During the Delivery phase, we define a Conceptual Solution, showing ideal end-state architecture, an initial architecture and the architectural evolution as dictated by the Areas of Focus, such as leveraging Verified Permissions for Fine Grained Access and Secrets Manager for storing server to server credentials. This is where the work from previous phases comes together to create the IAM Roadmap, which will set out a phased approach, demonstrating incremental value.

    The roadmap then forms the basis for the business case. We work with your organisation to estimate new or uplifted components mapped into deliverables with supporting resource plans for delivery, including internal team structures and external augmentation requirements. This provides a phased investment plan required to deliver the strategy and architecture.

    Versent packages these artefacts into a business case that can be used for executive presentations and funding requests. Versent works with all stakeholders along the journey to ensure that all the requirements are detailed out in the business case. Versent has a history of working with organisations to help uplift their identity controls and capabilities across the organisation for internal and external identity types. Our approach is to utilise our expertise in implementing standards based, pattern led, efficient, and automated solutions.

    The focus of the IAMA is; • Current State Discovery • Target State Capability Model & Gap Assessment • Reference Architecture & Component Model • Data Classification and Protection • Consumption and integration practices & patterns • Business Case for change As part of the IAM Assessment, Versent provides experienced identity specialists. The team will work with your business ICT team to collectively understand build out a roadmap for change and uplift aligned to your business needs.

    What we deliver: • Strategic assessment of your cloud workload security, processes and skills aligned to your business risk profile. • Roadmap of recommended activities. • A business case to change.

    Software Associated with this service: • AWS IAM Identity Centre • Amazon Verified Permissions • AWS Secrets Manager

    Highlights

    • IAM assessment of your existing technology, processes and skills aligned to your strategic outcomes and risk profile.
    • Reference Architecture, including component model and integration patterns.
    • Recommended Roadmap of implementation, including quick changes to implement controls to meet short term strategic objectives and improve your organisations risk position. Roadmap Business Case

    Details

    Sold by

    Delivery method

    Pricing

    Custom pricing options

    Pricing is based on your specific requirements and eligibility. To get a custom quote for your needs, request a private offer.

    How can we make this page better?

    We'd like to hear your feedback and ideas on how to improve this page.
    We'd like to hear your feedback and ideas on how to improve this page.

    Legal

    Content disclaimer

    Vendors are responsible for their product descriptions and other product content. AWS does not warrant that vendors' product descriptions or other product content are accurate, complete, reliable, current, or error-free.

    Support

    Vendor support