<p><span>The PRINCE2 Agileยฎ Practical Implementation Guide โ Step-by-step advice for every project type, Second edition is an official AXELOS-licensed guide that explains the PRINCE2 Agile framework in clear business language with practical guidance on how to implement this framework for any project
Guidance for IT Asset Management (ITAM): Step by step implementation guide with workflows, metrics, best practices and checklists (100% Practical Implementation Guide)
โ Scribed by Kiran Kumar Pabbathi, ServiceManagers.org (editor)
- Tongue
- English
- Leaves
- 187
- Category
- Library
No coin nor oath required. For personal study only.
โฆ Synopsis
Guidance for ITAM provides a direction in a concise, clear, user friendly and understandable way for all the ITAM audiences (newbie's, intermediates, experts). This book is not just for ITAM process consultants or management folks talking just about process definition and implementation. It will be of great help for Solution Architects and Technology Consultants, for designing ITSM tools with respect to ITAM processes. What so unique about this book? ยท Itโs going to tell you pre-requisites, objectives, and business needs of ITAM processes ยท Itโs going tell you a step by step approach for implementing ITAM processes ยท Itโs going to tell you an approach for designing ITAM tools (through workflows, mandatory fields, and business logics) ยท Itโs going to tell you the effective metrics for ITAM processes and operations ยท Itโs going to tell you the best practices ยท Itโs going to tell you the checklists for ITAM process with respect to management and operations teams
โฆ Table of Contents
Preface
Acknowledgements
About the author
Why this book?
Table of contents
Table of Figures
Register This Book
Certification Program
Frequently asked questions on IAM
INTRODUCTION TO IDENTITY & ACCESS MANAGEMENT
Basic Terminology in IAM
What is Identity and Access Management?
Why do we need Identity & Access Management?
Identity & Access Management for Organizationsย
Identity & Access Management for IT
Identity & Access Management for Users
Identity and access management for organizations
Challenges in Identity and Access Management
Benefits of Identity & Access Management
Risks for an organization without IAM
IT accounts
User identity lifecycle process
Access management lifecycle process
Manual procedures for identity and access management
Primary stakeholders in IAM
Information Security Management
IDENTITY & ACCESS MANAGEMENT SERVICE
What are IT services?
What is Identity & Access Management Service (IAMS)?
Who needs IAMS?
IAM PROCESS DEVELOPMENT
Strategy for IAM Process Development
Strategy definition
Costs and benefits analysis
Design for IAM Process
Scope Development
Requirements Development
Risk Mitigation
Process Development
Process Testing
Continuous Improvement
PDCA approach
IAM processes & its relationships
IAM and ISM
IAM and Risk management
IAM and Change management
IAM and Configuration management
IAM PRODUCT DEVELOPMENT
Strategy for IAM Products Development
Strategy definition
Demand analysis
Risk analysis and mitigation
Costs and Benefits analysis
Design for IAM Products
Scope Development
Requirements Development
Availability, Capacity and Continuity (ACC) Definition
Architecture Definition
Data Storage Definition
Data Transmission
Workflows, Policies and Scheduled Tasks Definition
IAM Product Deployment
Documentation Development
Testing
Proof of Concept (POC)
Implementation
Key aspects to be considered while selecting an IAM tools
Operations for IAM Products
Generic operational activities
IAM Operational Activities
Continuous Improvement
Continuous Improvement Methods
Metrics for Identity and Access Management
CSFs for Identity and Access Management
IAM FOR PRACTITIONERS AND EXPERTS
IAM Consulting
Analysis
Response
Design
Implementation
Improvement
Scenario on IAM consulting project
Skill sets required for an IAM Consultant
Skill sets required for an ISM Consultant
Business logic in Identity Management tools or applications
Business logic in Access Management tools or applications
Business logic in Authentication and SSO
Business logic in Multi-domain SSO
Business logic in Identity Federation
Approach for implementing IAM products
Plan
Design
Install
Configure
Operate
Evaluate
Early life support
New functionalities in IAM solutions
Self-registration
Self-service
Single Sign on
Reconciliation
Attestation
Evolving trends in IAM
Identity Federation
Identity Governance
Identity Analytics
Privileged Identity Management
Access control based on devices
Biometrics in IAM
IAM in Cloud Computing
Identity Relationship Management
Technology in IAM
LDAP
Directory
Directory service
Directory server
Virtual directory
LDAP server
Guidelines for IAM tasks
User identity creation
User identity de-provisioning
Password maintenance
User identity reconciliation
Common mistakes in IAM
Maturity levels for IAM
Best practices for IAM
SOX Criteria for IAM Process/Tools
ISO/IEC27001 and 27002 Requirements for IAM
Checklist for Identity Management Product Selection
Checklist for Access Management Products
Auditing checklist for IT management with respect to IAM
Due diligence for IAM projects
Quality assessment on IAM projects
Cost and Time Graph for IAM products implementation
OVERVIEW OF FEW IAM SOLUTIONS
Oracle Solutions
Microsoft Solutions
Bizenit Information Technology Solutions
Acronyms
Index
๐ SIMILAR VOLUMES
A professional technical roadmap to Challenges, Opportunities, Change Management & Implementation of a Successful Outsourcing Process, with templates & design documents for organizational implementation.
This third edition of Sheldon and Yoxon's authoritative Environmental Management Systems (previously entitled Installing Environmental Management Systems) has been extensively revised to cover changes in international standards and other related developments in the field such as British Standard BS
<P>This book offers a practical and reliable approach to how an organization can move beyond all of the separate initiatives and hype associated with sustainability. It shows how to build in what is already in place, in order to create a sense of stewardship that protects the environment, creates a