Our approach

The road to information security

We help you set up Identity Management from policies to management. Capitar Security uses a proven standard phasing for the design, implementation and management of IAM environments. We see an implementation of an IAM environment as a programme, in which the parts are tackled on a project basis.

alt text

IAM policy

In this phase, together with your key employees, we take stock of your requirements and wishes and convert them into a clear document that contains the guidelines for the further organisational and technical set-up. This is based on your current working methods and looks at the possibilities for reinforcement and improvement.

IAM landscape

This is a representation of all aspects that play a role in the realisation and operationalisation of the IAM policy.

Processes and role based access model

Based on the current set-up of the systems and the present inflow, outflow and transfer processes, the desired situation is laid down in a functional architecture. This document defines the rules, processes and the role based access model you want to use. This document is drawn up in close cooperation with the client.

Realisation

The foundation for the realisation is laid with our standard approach. This means the design, the technical set-up of the systems and the connection to the main source and target systems. The technical operation is tested. Depending on the chosen approach and solution, the realisation consists of one or more phases.

Implementation

Depending on the chosen implementation strategy, part by part implementation takes place. This includes both the technical start-up and the organisational preparation, instruction and embedding of new working methods.

IAM application management

As soon as an implementation is completed, that part of the environment is taken into management. Step by step, the application management is expanded in this way.