Problem Statement:
Following a successful Phase 1, the client needed to extend their Identity & Access Management (IAM) framework to cover additional critical applications. There was a critical need to move the Disaster Recovery (DR) server setup into this phase and enforce robust governance over user data to enhance the organization's overall cybersecurity posture.
Solution:
I am leading the Phase 2 implementation of RSA Governance & Lifecycle. This involves configuring Identity Governance (IG) for automated access reviews and Identity Lifecycle Management (ILM) for automated Joiner, Mover, and Leaver (JML) processes. The solution integrates deeply with HRMS and Active Directory to map user attributes and enforce "Birthright Provisioning".
The Outcome:
We are currently in the process of finalizing the Functional Specifications Document (FSD) and conducting workshops for solution design. Upon completion, the client will have a fully automated identity lifecycle for their core business applications and a functional Disaster Recovery site, ensuring business continuity and strict data governance.
Problem Statement:
As part of an internal audit requirement, the client needed to strengthen access control and eliminate manual password release processes that posed high security risks. The organization required a solution to manage privileged access for internal employees and vendors, accommodate higher concurrent administrator sessions, and comply with a strict Zero-Trust framework.
Solution:
I am currently managing the deployment of Imprivata PAM across a High Availability (HA) Production site and a Disaster Recovery (DR) site. The scope includes onboarding 154 assets and developing 30 custom connectors for critical platforms like JDE, ERP, and Virtualization infrastructure. We are establishing a "Standard Onboarding Model" to streamline future integrations.
The Outcome:
The project is currently establishing a centralized password vault and automated access workflows. Once fully live, this will provide total visibility over privileged user activities, automate the Joiner-Mover-Leaver (JML) password processes, and significantly simplify the client's annual internal audit exercises.
Problem Statement:
The client faced challenges in monitoring and controlling emergency workflows within their existing environment, creating audit gaps for ISO27001 and BNM RMIT compliance. The current approval process left emergency access unrestricted without approver oversight, while password management remained manual and exposed, lacking visibility into third-party vendor activities.
Solution:
I led the end-to-end implementation of Imprivata PAM, establishing a robust 3-tier architecture that segregated the Database, PAM, and RemoteApp (RDS) servers. The solution involved onboarding 30 privileged users and 98 critical assets—including Windows, AIX, Linux, Databases, and Network/Security devices. We implemented automated password management, video-based session recording, and forced "Just-in-Time" access workflows to de-risk the environment.
The Outcome:
The project was successfully delivered ahead of schedule, providing the client with a "Quick Win" PAM foundation within the first 8 weeks. The new system enforces a strict Zero-Trust framework, ensuring all privileged sessions are authorized, recorded, and auditable, fully satisfying the client's ISO27001 and RMIT regulatory requirements.
Problem Statement:
The automotive manufacturer needed to streamline their identity governance and administration (IGA) processes and integrate them with their SuccessFactors HR system to improve efficiency and security.
Solution:
Implemented an IGA solution and integrated it with SuccessFactors, automating user provisioning and de-provisioning, access request workflows, and access certifications.
Outcome:
Improved operational efficiency, reduced manual effort, and enhanced security posture by ensuring that only authorized users have access to critical systems and data.
Problem Statement:
The telecom company needed to upgrade their existing PAM solution and migrate data to a new platform to improve security and compliance.
Solution:
Upgraded the PAM solution and migrated data to the new platform, ensuring seamless transition and minimal disruption to business operations.
Outcome:
Enhanced security posture, improved compliance with industry regulations, and reduced the risk of privileged access abuse.
Problem Statement:
The organization lacked a formal Information Security Management System (ISMS) and needed to establish one to achieve ISO 27001 certification.
Solution:
Developed and implemented an ISMS framework aligned with ISO 27001 requirements, including policies, procedures, and controls.
Outcome:
Established a robust ISMS, improved information security posture, and achieved readiness for ISO 27001 certification.
Problem Statement:
The property developer needed to implement an Identity and Access Management (IAM) solution and integrate it with their RSA SecurID system to improve security and user experience.
Solution:
Implemented an IAM solution and integrated it with RSA SecurID, providing secure authentication and authorization for users.
Outcome:
Enhanced security posture, improved user experience, and streamlined access management processes.