Secure Identities and Access Workshop Delivery Guide 4 July 2022


Key results, recommendations and next steps



Download 1.16 Mb.
Page34/37
Date08.08.2023
Size1.16 Mb.
#61825
1   ...   29   30   31   32   33   34   35   36   37
Secure Identities and Access

Key results, recommendations and next steps




Use this activity of the Secure Identities and Access Workshop to present and discuss the key results and recommendations from all activities included in the Secure Identities and Access Workshop (in the form of design decisions made and high-level deployment plans defined). Agree on the next steps that will help the customer increase their identity security posture based on the Secure Identities and Access Workshop findings.




Objectives

  • Deliver the 10 - Secure Identities and Access - Key results, Recommendations and Next Steps.pptx presentation.

  • Define and agree with the customer on next steps in terms of follow-up activities and/or engagements.
Format

Can be delivered as an onsite or online workshop.
Customer resources
Delivery resources

  • Security Architect

  • Engagement Manager
Supporting materials

  • 10 - Secure Identities and Access - Key results, Recommendations and Next Steps.pptx

  • 98 - Secure Identities and Access - Design Decision Points.xlsx
Preparation

The delivery resource will need to familiarize themself with:

  • 10 - Secure Identities and Access - Key results, Recommendations and Next Steps.pptx

  • 98 - Secure Identities and Access - Design Decision Points.xlsx
Pre-requisites

The activities outlined in 12.2 Demos should be completed prior to starting this activity.
Deliverables

The deliverables are defined as:

  • Next steps defined and agreed upon with the customer (follow-up engagements).

  • Final version of the 10 - Secure Identities and Access - Key results, Recommendations and Next Steps.pptx presentation handed over to the customer.

  • Final version of the 98 - Secure Identities and Access - Design Decision Points.xlsx presentation handed over to the customer.
Guidance

Deliver the activity by presenting the 10 - Secure Identities and Access - Key results, Recommendations and Next Steps.pptx that was prepared earlier as you worked together with the customer through the activities described in section 11 Design and Planning and 12 Workshop Day. Wherever necessary, switch to the 98 - Secure Identities and Access - Design Decision Points.xlsx spreadsheet to discuss details of and/or rationale for design decisions made during the engagement.



  • When presenting, be concise and stick to the facts.

  • Allow the customer to draw their own conclusions.

  • Make sure that you discuss, define, and agree with the customer on next steps in terms of follow-up activities and/or engagements. If possible, identify owners from both the customer and delivery organization, expected timelines, and resources needed. Document the next steps as part of the 10 - Secure Identities and Access - Key results, Recommendations and Next Steps.pptx presentation.

  • Make sure you reserve some time for Q&A.

As this activity concludes the delivery of the Secure Identities and Access Workshop engagement, at the end of the activity, hand over the final versions of the following deliverables to the customer:

  • 10 - Secure Identities and Access - Key results, Recommendations and Next Steps.pptx.

  • 98 - Secure Identities and Access - Design Decision Points.xlsx.



Background reading

To prepare for the delivery of the Secure Identities and Access Workshop engagement, refer to Appendix A - Readiness and Technical Content for links to relevant online learning content.
Duration and effort

  • Preparation 1 Hrs.

  • Delivery 2 Hrs.



Download 1.16 Mb.

Share with your friends:
1   ...   29   30   31   32   33   34   35   36   37




The database is protected by copyright ©ininet.org 2024
send message

    Main page