A Single Partner for Everything You Need Optiv works with more than 450 world-class security technology partners. By putting you at the center of our unmatched ecosystem of people, products, partners and programs, we accelerate business progress like no other company can.
We Are Optiv Greatness is every team working toward a common goal. Winning in spite of cyber threats and overcoming challenges in spite of them. It’s building for a future that only you can create or simply coming home in time for dinner. However you define greatness, Optiv is in your corner. We manage cyber risk so you can secure your full potential.
Customization of IAM Solutions: Risks of Having it Your Way Breadcrumb Home Insights Blog Customization of IAM Solutions: Risks of Having it Your Way April 20, 2018 Customization of IAM Solutions: Risks of Having it Your Way Forty years ago Burger King launched a revolution in customization, declaring that they could provide you the power of creating your perfect burger combo. Made to order, fresh, fast and no extra cost. The slogan “Have it Your Way” (replaced now by “Be Your Way”) has more than impacted our drive thru satisfaction, it has become a way of applying customization to anything and everything. However, I know the limitations of my BK order. I understand what BK offers out of the box/bag and what they are designed to provide. I know I cannot order a grilled salmon salad with champagne vinaigrette dressing on the side. Similarly, we’ve come to expect ultimate flexibility from identity and access management (IAM) solutions because leadership, end users, or business processes push the “Have it Your Way” mentality. IAM solutions are designed with out of the box functionality that provides efficient processes and security best practices. Bringing the mindset of customizing everything into the IAM world holds several risks, for example: Customization of any IAM tool creates more work to maintain it, both short and long term; Expanding any tool beyond what it was designed for puts your processes on thin ice. If Burger King did suddenly offer salmon, I wouldn’t take my chances The current processes may not fit well with the out of the box functionality, so “your way” should be evaluated before considering customizing the solution Costs money via resources and time Slows down application or system upgrades, as customizations have to be closely watched for code changes that could break Isn’t typically supported by the product vendor, so if you customize it and it breaks, it’ll be a costly fix The final risk is crucial for businesses to consider prior to implementing IAM solutions. When evaluating customizations, dare to ask “why?” There may be diagrams of current business processes, but why is it that way? Answers typically sound like something from the drive thru window - “The owner of this system left the company and didn’t document the process. Then the owner of the next system wrote a script and the reviewer wanted a report formatted like this. Then this manager wanted to verify or approve using X method, while another liked Y method better.” And so began the request for a Burger King solution, because everyone wanted it “their way.” If this sounds like your culture or system complexity, look for the logic in the processes. To lead a successful IAM program, you’ll have to weed out the comfort of “that’s how it’s always been” vs. real system or process complexities. The goal should be a holistic, centralized solution with opt-in capabilities that focuses on solving the real pain points of all business lines in the best way possible and minimizes custom configuration. However, some scenarios may require more effort to fix, than can be resolved through a customized IAM solution. Remember that out of the box functionality is your friend, not your foe. As much as feasible to your business, try to mold your processes to fit the tool, not the other way around. Don’t be afraid to challenge the status quo, reducing the risk of creating a custom IAM burger recipe that will quickly lead you to timeline and budget heartburn. By: Dusty Anderson Client Solutions Advisor Dusty Anderson is a client solutions advisor for Optiv’s identity and access management (IAM) practice. In this role she leverages her in-depth IAM experience to assist clients in developing comprehensive strategies and solutions to their real-world problems. Share: identity
Would you like to speak to an advisor? How can we help you today? Image E-Book Cybersecurity Field Guide #13: A Practical Approach to Securing Your Cloud Transformation Download Now Image Events Register for an Upcoming OptivCon Learn More Ready to speak to an Optiv expert to discuss your security needs?