We led a multi-phased initiative to design, enhance, and expand an enterprise-wide Identity and Access Management (IAM) system, addressing the organization’s need for stronger security, regulatory compliance, and streamlined access processes.
Phase One: Discovery & Strategy (Jul 2022 – Jan 2023)
The initiative began with a comprehensive discovery phase, where we conducted in-depth data collection, stakeholder interviews, and system analysis. We cataloged the organization’s applications, documenting ownership, user roles, access controls, and unique security requirements. This effort also evaluated the regulatory landscape to ensure compliance with industry standards.
The discovery phase identified vulnerabilities in the current system while uncovering opportunities for improvements such as Single Sign-On (SSO) and Multi-Factor Authentication (MFA). The insights formed the foundation for a detailed roadmap that introduced role-based access control (RBAC), process enhancements, and risk mitigation strategies.
Phase Two: Enhancement & Expansion (Jan 2023 – Mar 2024)
Building on the groundwork, we advanced into a large-scale enhancement and expansion effort. This phase involved cataloging and preparing over 800 additional applications for integration. We leveraged an IT Service Management (ITSM) platform, configuration management database (CMDB), access control tools, and an integration hub to manage the complexity.
Our focus was on centralizing identity management, refining policies, and implementing automated provisioning and deprovisioning. Key features included role-based access control, MFA, and SSO — all designed to strengthen security while improving usability.
Challenges and Outcomes
The project faced significant challenges, including integrating with complex legacy systems, managing inconsistent data, and meeting aggressive timelines. Through effective collaboration, clear communication, and a disciplined program structure, the team overcame these hurdles.
The final result was a secure, scalable, and user-friendly IAM system that not only met but exceeded stakeholder expectations. It significantly reduced risks of unauthorized access, improved compliance, and streamlined the user experience. The initiative established a new standard for IAM implementations within the organization, combining stronger cybersecurity with greater operational efficiency.
