AEC Services
Identity management analysis
Detailed analysis of the process and functional procedures for identity management in the company environment, where all roles and their permissions, including their link to the company organizational structure, are assessed.
Design and creation of a role catalogue
Permission is the key to performance of any activity executed in the target system. This set of permissions should be combined into application or system roles, while applying security principles over the set.
Design and creation of an identity management process
Identity lifecycle, from its creation in the system, through any changes, all the way to archiving or deletion thereof, is defined by an identity management process, which always needs to be modified per the company requirements.
Integration and implementation plan
Any of the custom-made applications or systems may present quite a complication when trying to centralize management of identities. So, it is necessary to identify the possibility of their centralization and logging, including the priority for connecting them to the IdM solution. However, it is not necessary only for such applications and systems, but for all others as well.
Solution integration and implementation
Inputs from the analytic phase will be applied in the real world by actually connecting the applications and systems into the Identity management solution.
Adapting the solution
Each company operates in a unique way. And this is the reason why each identity lifecycle management process has to be unique as well. Therefore, it has to be modified to reflect the capabilities of the implemented solution.
Automation
Things that had to be done manually in the past have to be automated as much as possible. Automation significantly lowers the costs that need to be spend on the identity management.
Consulting services
One of the key AEC assets. We can provide these services because our company is diversified into specialized divisions (Security Technologies, Risk & Compliance, Security Assessment, Cyber Defense Center). This way, we are able to enrich all outputs through reciprocal interconnections and mutual collaboration with the knowledge and insights from different angles into the overall situation.