IAM Implementation

Identity Access Management (IAM) systems play a crucial role in the onboarding process for new employees within your company. These systems determine whether users can effectively carry out their roles from day one, eliminating the need for them to wait days or even weeks before gaining access to the necessary systems required to perform their job and contribute value to your organisation. Conversely, IAM systems also ensure that users who leave your company promptly lose access to company systems. 


Implementing IAM solutions can be intricate and challenging, as they involve multiple touch points within your business. This is where our expertise shines through. With a proven track record of successfully completing numerous IAM projects, whether On-Prem, Cloud, or Hybrid solutions, we possess the knowledge and experience to identify the key stakeholders and engage them at the appropriate stages. 


These touch points typically include: 

  • Security teams 

  • HR department 

  • Application teams 

  • Networks 

  • Risk and Compliance teams 

  • Contractors 

  • Suppliers 

  • Legal department 


Before initiating engagement, it is important to consider the following factors: 

  • Is there a robust IAM framework in place that defines the appropriate IAM policies, enabling risk and security teams to govern the business effectively? 

  • Do you have an up-to-date asset management database for applications? 

  • What is the priority for onboarding, based on factors such as criticality, audit requirements, users, and regions? 

  • Have you conducted a Current State Assessment (CSA) to identify your key objectives? 

  • Has the steering committee been established and reached a consensus? 

  • Are there any impending company changes that could impact project delivery dates? 


Our approach to supporting, driving, or delivering IAM projects includes: 

  • Creating a detailed phased roadmap that considers both tactical and strategic requirements. 

  • Setting up stakeholder and steering committee structures. 

  • Establishing a robust IAM Framework. 

  • Creating and standardising IAM policies. 

  • Defining and implementing processes such as Joiner/Mover/Leaver (J/M/L), Password Management, Role-Based Access Control (RBAC), Recertification Campaigns, Mass onboarding, and detection of toxic combinations. 

For further details or consultation, please contact us at contact@thirdwaveidentity.com