🛡️ Sherlocked Security – Identity Governance & Administration (IGA)
Streamline Identity Lifecycle Management, Access Governance, and Regulatory Compliance
📄 1. Statement of Work (SOW)
Service Name: Identity Governance & Administration (IGA)
Client Type: Enterprises, FinTech, Healthcare, BFSI, Government
Service Model: Advisory + Design + Implementation Support
Compliance Coverage: ISO 27001, NIST 800-53, SOX, HIPAA, GDPR, RBI
IGA Focus Areas:
- Identity Lifecycle Management (Joiner-Mover-Leaver)
- Access Request & Approval Workflows
- Role-Based & Attribute-Based Access Controls
- Access Reviews & Recertification
- Integration with HRMS and Directory Services
🧠 2. Our Approach (with Visual)
🔹 Business-Aligned Identity Strategy
🔹 Centralized Governance Model
🔹 Risk-Based Access Controls
🔹 Automation-First Implementation
generate one Picture with AI with color code below:
[Stakeholder Discovery] → [Current State Review] → [Policy & Role Design] → [Tooling & Connector Planning] → [Workflow Design] → [Implementation & Testing] → [User Training & Go-Live] → [Audit & Optimization]
Color Code:
- Discovery: #064d52
- Implementation Phase: #8b0505
- Closure: #0f5c5a
🧪 3. Methodology (with Visual)
plaintext
[Kickoff & Requirements] → [IGA Gap Analysis] → [Access Governance Framework Design] → [Tool Evaluation or Optimization] → [Workflow Configuration] → [UAT & Pilot] → [Organization-Wide Rollout] → [Access Review & Certification]
Visual Color Flow:
- 🔹 Blue (Planning: #064d52)
- 🔸 Red (Implementation: #8b0505)
- ✅ Green (Closure: #0f5c5a)
📦 4. Deliverables to the Client
- 🧾 IGA Strategy and Roadmap Document
- 🗺️ Identity Lifecycle Policy (JML)
- 📘 Role & Access Model Definitions
- 🔐 Workflow Design for Access Requests
- 🧪 Tool/Connector Architecture Blueprint
- 📊 Access Review & Certification Templates
- 📽️ End-User and Admin Training Guides
- 🧑💻 Post-Go-Live Optimization Plan
🤝 5. What We Need from You (Client Requirements)
- ✅ Access policies and compliance mandates
- ✅ HRMS integration availability
- ✅ Directory/IdP information (e.g., AD, Azure AD)
- ✅ Stakeholder access for interviews
- ✅ App list with access permissions and roles
- ✅ Prior audit reports (if available)
🧰 6. Tools & Technology Stack
- 🛠️ SailPoint, Saviynt, Omada, Oracle IGA
- 🔐 Azure AD, Okta, Ping for Identity Fabric
- 🧱 SCIM & REST connectors
- 🔁 HRMS integrations (Workday, SAP, BambooHR)
- 📊 Custom dashboards via Power BI/Tableau
- ✅ APIs for workflow & role sync
🚀 7. Engagement Lifecycle (Lead → Closure)
plaintext
1. Initial Consultation 2. Discovery Workshops 3. NDA + SOW Finalization 4. Current-State & Risk Mapping 5. Role/Policy Design 6. Tooling Strategy 7. UAT & Pilot Execution 8. Org-Wide Rollout 9. Optimization & Review
🌟 8. Why Sherlocked Security? (Our USP)
Feature | Sherlocked Advantage |
---|---|
🔐 Lifecycle Automation Experts | JML, self-service, access approval automation |
🧠 Compliance-Driven Design | Built with auditability and least privilege in mind |
📊 Visibility & Reporting | Access review dashboards and compliance reports |
🔁 End-to-End Execution | From policy to deployment to certification |
🛠️ Platform-Agnostic | We support SailPoint, Saviynt, Oracle, and more |
📚 9. Real-World Case Studies
🏦 Banking Sector – IGA Centralization
Client: Global Private Bank
Challenge: Disconnected access workflows, failed audits
Solution:
-
Integrated HRMS with SailPoint IGA
-
Role-based access definitions per business unit
-
Automated access reviews and certification
Outcome: -
80% faster offboarding
-
Passed SOX and RBI audits
💼 SaaS Startup – Lightweight IGA Setup
Client: HRTech Startup
Issues:
-
Manual access management and onboarding
-
No central audit trail or request history
Our Fix: -
Okta + BambooHR-based automated JML
-
SCIM-based app provisioning
Impact: -
Reduced onboarding time from 3 days to 30 mins
-
Full visibility into access changes
🛡️ 10. SOP – Standard Operating Procedure
- Kickoff and team alignment
- Identity & access discovery
- Define roles, policies, and approval flows
- Select tools and design connectors
- Configure access request workflows
- Conduct pilot testing with key user groups
- Implement across org in phases
- Enable access reviews and recertification
- Finalize documentation and provide training
- Optimize based on audit feedback
📋 11. Sample IGA Controls Checklist (Preview)
- Define identity lifecycle processes (joiner/mover/leaver).
- Automate user provisioning and de-provisioning.
- Implement access certification and review cycles.
- Use role-based and attribute-based access controls.
- Integrate with HR and authoritative sources.
- Maintain audit trails and reporting for compliance.
- Detect and remediate orphaned or unused accounts.
- Monitor segregation of duties (SoD) violations.
- Enable self-service access requests with approvals.
- Continuously improve policies via analytics and feedback.