User Provisioning Best Practices
This document describes and justifies current user provisioning best
practices in an enterprise network. It is intended to offer reasoned
guidance to information technology decision makers when they set security
policy and design processes to manage user identity data, such as accounts
and directory objects, across multiple enterprise systems.
The document is organized as follows:
- Background information:
Defining enterprise identity management and identifying business
drivers for and deliverables from user life-cycle management.
- Business drivers:
Including both hard and soft costs, security threats and regulatory
- Human factors:
How human behaviour affects identity management outcomes.
- Administration processes:
Recommended business processes for managing user identity data
and user access to systems.
- Internal controls:
Requirements and recommendations for establishing effective
internal controls over user access to systems.
- Find out more:
Other resources with information about password management.
Access to this document requires registration. Please fill in the
form below. The full document will be emailed to you automatically.