Secure Identities and Access Workshop Delivery Guide 4 July 2022



Download 1.16 Mb.
Page29/37
Date08.08.2023
Size1.16 Mb.
#61825
1   ...   25   26   27   28   29   30   31   32   ...   37
Secure Identities and Access

Passwordless (optional)




This activity is divided up into the following two parts:
Passwordless Presentation
Explain how passwordless authentication can help the customer to secure access to their applications and related options and design decisions that should be made prior to its deployment.
Work on the deployment plan for passwordless authentication
Then, work together with the customer to review their current application access strategy and show how passwordless authentication can help to make it more secure. Help the customer start making design decisions towards the deployment of passwordless authentication in their organization. Finally, the high-level deployment plan for passwordless authentication should be updated and the next steps should be defined.


Objectives

The objectives for the activity are to present an overview of passwordless authentication, help the customer start making design decisions towards the deployment of passwordless authentication in their organization, formulate a high-level deployment plan for passwordless authentication and define next steps, particularly the following:

  • Deliver the 13 - Secure Identities and Access - Passwordless.pptx presentation.

  • Make and document design decisions as part of 98 - Secure Identities and Access - Design Decision Points.xlsx.

  • Update the Passwordless deployment plan slides within the 10 - Secure Identities and Access - Key results, Recommendations and Next Steps.pptx presentation.

  • Define and agree with the customer on next steps in terms of follow-up activities and/or engagements and document as part of the next steps in the 10 - Secure Identities and Access - Key results, Recommendations and Next Steps.pptx presentation.
Format

Can be delivered as an onsite or online workshop.
Customer resources

  • Security Team.
Delivery resources
Supporting materials

  • 02 – Secure Identities and Access - Customer Questionnaire.docx

  • 13 - Secure Identities and Access - Passwordless.pptx

  • 98 - Secure Identities and Access - Design Decision Points.xlsx

  • 10 - Secure Identities and Access - Key results, Recommendations and Next Steps.pptx
Preparation

The delivery resource will need to familiarize themself with:

  • 02 – Secure Identities and Access - Customer Questionnaire.docx

  • 13 - Secure Identities and Access - Passwordless.pptx

  • 98 - Secure Identities and Access - Design Decision Points.xlsx

  • 10 - Secure Identities and Access - Key results, Recommendations and Next Steps.pptx
Pre-requisites

The activities outlined in section 10 Engagement Setup and Reporting must be completed prior to starting this activity.
Deliverables

The deliverables of the module are defined as:

  • Design decisions made and documented as part of 98 - Secure Identities and Access - Design Decision Points.xlsx.

  • Updated Conditional Access high-level deployment plan within the 10 - Secure Identities and Access - Key results, Recommendations and Next Steps.pptx presentation.

  • Next steps defined and agreed upon with the customer (follow-up engagements) and documented as part of the next steps in the 10 - Secure Identities and Access - Key results, Recommendations and Next Steps.pptx presentation.
Guidance

Deliver the activity by presenting the 13 - Secure Identities and Access – Passwordless.pptx presentation and then use the 98 - Secure Identities and Access - Design Decision Points.xlsx spreadsheet to help the customer start making design decisions towards deployment of Conditional Access in their organization.


1   ...   25   26   27   28   29   30   31   32   ...   37




The database is protected by copyright ©ininet.org 2024
send message

    Main page