CIAM Program Overview-V2
CIAM Program Overview-V2
Identity and access management (IAM) is the most important discipline of the
information security field. It is the foundation of any information security program and
one of the information security management areas which interacts with users the most.
IAM defines and enforces which systems users can access and ensures that their identities
are properly managed throughout the identity lifecycle from on-boarding, identification,
initiation, and authentication, to access provisioning, activity monitoring and termination.
The Certified Identity and Access Manager® (CIAM) designation is a registered program
developed for risk conscious professionals who manage identity risks and user access to
systems.
Identity Lifecycle
The Challenge
The following are several areas and business risks which demand companies to
embrace IAM programs, skilled professionals, and technologies:
Mobile Computing
Copyright by Identity Management Institute
All Rights Reserved
Page 2 of 6
Certified Identity and Access Manager® (CIAM)
Overview & Curriculum
Cloud Computing
Connected Devices
Social Media
Big Data
Data Loss and Theft
Privacy
Regulations
Identity Theft
Cyber Crime & Terrorism
Regulatory Compliance
From a regulatory compliance standpoint, there are many overlapping laws pertaining to
customer identification, privacy, and fraud prevention that companies must manage as
effectively and efficiently as possible. For example, companies are required to establish a
formal Customer Identification Program (CIP), monitor account activities, ensure the
security of private information, authorize data access, report suspicious activities, and
prevent identity fraud.
Although, identity and access management is critical for protecting consumer information
and complying with privacy and other regulations, IAM is evolving beyond compliance
to become a risk-based function that can help an organization achieve competitive
advantage through lower access costs, increased efficiency, and reduced risk of security
breaches.
The CIAM Critical Risk Domains (CRD) define the knowledge and experience areas that
a professional must possess in order to effectively manage the identity and access risks
for his or her assigned area of responsibility and also understand how others within the
company contribute to the identity and access risk management efforts of the enterprise.
As such, a CIAM needs to possess a general knowledge in all CRDs, however, is not
expected to possess hands on experience in all CRDs as some identity and access
management practices are distributed across the enterprise and may require specialized
skills in some cases.
The following are the Critical Risk Domains used for CIAM training, testing, and
certification:
1) Strategy and Governance: Identity governance aligns the IAM program with both
business objectives of the enterprise and identified risks facing the organization in the
most efficient manner. When activities which can be centralized or automated remain
distributed, they often lead to additional and unnecessary costs. It is also important to
engage system and data users through education and training about the policies to
actively seek their support for the identity governance objectives as well as the IAM
program to ensure maximum efficiency and effectiveness in the identity management
lifecycle.
As companies develop a strategy and plan for their identity and access management,
they should define a desired state and assess their current state using a capability
assessment model to ensure improvement of the current state to address risks,
regulatory requirements, automation, efficiency, metrics, and reporting.
2) Program Management: The IAM program should consist of all the elements required
to assess, improve, and manage IAM in line with company's governance and strategic
plans. The program defines ownership for various tasks, stakeholders, project
management teams, processes, tools, reporting, etc. The program also incorporates
processes to facilitate the interaction between people, processes, and technology
which is necessary to make the program successful.
3) Lifecycle and Transformation: The identity and access management lifecycle consists
of access request and approval, provisioning and de-provisioning, enforcement,
auditing and reporting, access review and certification, and account reconciliation.
IAM transformation relates to the assessment and improvement of current capabilities
to meet the desired identity and access management objectives for managing risks and
Copyright by Identity Management Institute
All Rights Reserved
Page 4 of 6
Certified Identity and Access Manager® (CIAM)
Overview & Curriculum
meeting compliance needs efficiently and cost effectively while leveraging IAM tools
as necessary.
4) Access Request and Approval: The first phase in the identity and access management
lifecycle is the access request and approval processes which must be managed as
centrally as possible with adherence to SLAs and compliance requirements. Business
roles are used to not only define appropriate access profiles and rights which align
with the job functions but also to increase users' and approvers' understanding of the
requested access to reduce the risk of excessive access. A self-service functionality
may be considered in this phase to make the access request process more efficient.
6) Enforcement: This phase of the IAM lifecycle includes a review of privileged access
logs, analysis of segregation of duties, and improvement of password controls.
7) Auditing and Reporting: Audit, analytics, monitoring and reporting are key
components for improving identity and access management programs. CIAMs must
define their audit plans based on risks and produce remediation plans and metrics to
report on performance based on established criteria. The audit and reporting efforts
must be aligned with the business objectives for identity and access risk management,
compliance, and improvement.
8) Access Review and Certification: To review and certify access, CIAMs must design a
plan to identify target systems and data, determine review strategy and tools, identify
review staff, establish a review and reporting frequency, and propose mitigation
plans. A centralized and automated access review process can be considered to
eliminate redundancy and lengthy processes. A risk-based review cycle must be
considered to reduce the review efforts while reaching the established access
certification and compliance goals. Focus must be placed on the most critical systems,
roles, and data.
9) Account Reconciliation: This phase can be automated through IAM tools. It consists
of ensuring that actual system access for any identity is consistent with the original
approved access request.
Copyright by Identity Management Institute
All Rights Reserved
Page 5 of 6
Certified Identity and Access Manager® (CIAM)
Overview & Curriculum
10) Tools: As companies evolve their IAM programs and seek to achieve higher levels of
maturity in their IAM lifecycle, they will deploy commercially available products to
streamline their processes, automate the IAM processes as much as possible, and
improve review, assessment, and reporting capabilities. CIAMs must be familiar at a
high level with the latest market solutions and their features.
Certification Process
For CIAM eligibility, application process, costs and maintenance, please visit the CIAM
page on the IMI website at http://www.identitymanagementinstitute.org