![]() ![]() ![]() Managing the end-to-end lifecycle of privileged users Supporting the retirement of legacy systems.Building custom functionality to support various groups, including VIP users.Automating annual training compliance for the entire end-user population.Implementing new access certifications and user separation workflows for applications, including high-value financial management applications.Developing a custom reporting and self-service role administration portal for end-user applications.Creating automated access request workflows to provision roles for enterprise applications.Other notable IGA-supported activities include: It uses processes and technologies to manage digital identities – securing valuable information and protecting agencies from costly data breaches. Our work established a new identity governance and administration (IGA) platform that continues to evolve and expand to meet added federal agency business requirements. New system improves access controls and automation As part of this effort, the EY team developed custom logic to automate the removal of user access for those who were not compliant with security guidelines and to remove access for users who had not logged into applications for a certain period of time. The initial scope of the project focused on implementing identity and access management software to support audit compliance. The EY team has been on the ground since late 2018 and is directly responsible for architecting, implementing and supporting identity governance and administration for the federal agency.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |