Business requirements
A business needs agreement on its security requirements before implementing the processes that IBM Security Identity Manager provides.
For example, requirement definitions might answer these questions.
- What groups of IBM Security Identity Manager users are there?
- What information does each user group need to see?
- What tasks do the users in each group need to do?
- What roles do users perform in the organization?
- Which access rights need definition?
- What working relationships exist that require some users to have different authority levels?
- How can prevention and auditing provide remedies for activity that does not comply with established policies?
To meet common business needs, a business might frequently have several groups, such as a manager, a help desk assistant, an auditor group. The business might have customized groups that do a more expanded or limited set of tasks.
Parent topic: System security overview