From 86919ef2c1d98a018112818f801595f79f4faa70 Mon Sep 17 00:00:00 2001 From: Heather Flanagan Date: Mon, 25 Feb 2019 06:23:50 -0800 Subject: [PATCH] Edited the IAM Solution Arch intro --- .gitignore | 9 +++++++++ IAM Architecture/Introduction.md | 11 +++++------ 2 files changed, 14 insertions(+), 6 deletions(-) create mode 100644 .gitignore diff --git a/.gitignore b/.gitignore new file mode 100644 index 0000000..e84ea69 --- /dev/null +++ b/.gitignore @@ -0,0 +1,9 @@ +*.aux +*.log +*.out +*.gz +*.toc +log.txt +*.lof +*.lot +*.DS_Store diff --git a/IAM Architecture/Introduction.md b/IAM Architecture/Introduction.md index 4e09c7c..7aa3892 100644 --- a/IAM Architecture/Introduction.md +++ b/IAM Architecture/Introduction.md @@ -1,16 +1,15 @@ IAM Solution Architecture ========================== -When approaching and IAM (identity and access management) project it is -important to consider the work as creating change within the +When approaching an IAM (identity and access management) project it is +important to consider the work as a process of creating change within the organization. In some circumstances the change will be minimal, with limited impact on resources. In other cases the change will be significant, impacting both infrastructure and personnel across the organization. It is highly recommended that a solution architecture for -IAM projects be developed. +IAM projects be developed. [HF: Why is a solution architecture important? Is it something that should be developed at the start of the process, or can it be done later? Perhaps: A solution architecture will act as the framework that ensures all components of the IAM project now and in the future are developed in an interoperable manner.] -Identity management within an enterprise touches virtually all systems -in use within the organization. Systems, in this context, comprise +Identity management within an organization touches virtually all systems that organization uses. Systems, in this context, comprise computer systems that staff use in the performance of their job responsibilities and physical systems such as a requirement to show a driver license to gain access to a restricted area. @@ -18,7 +17,7 @@ driver license to gain access to a restricted area. It is the task of an identity professional to ensure that, wherever and whenever identity information is used within an enterprise, the information is collected and used in an properly designed environment -that ensures efficiency, protects privacy and safeguards integrity. +that ensures efficiency, protects privacy, and safeguards integrity. Applying an architectural approach will significantly raise the likelihood that an IAM project will be completed consistently and comprehensively with controlled impact on stakeholders.