Bank
Identity and access management

For the past 8 years, we have been managing Level 2 support in charge of the administration and maintenance in operational condition of tools related to the authorization, identification, control and traceability of access to open systems and managed application environments. 

Bank – Identity and access management

Challenges

In a banking context of very strong security requirements, faced with the need for strict deployment of its security policy and in a search for optimization of its production resources, the implementation of a dynamic of continuous improvement and automation in the realization of operations around the management of accesses of IT collaborators accessing servers and technical assets was expected. 

12

IAM consultants

8

years of collaboration 

2M

individual accounts under management 

Combining skills for process optimization

The combination of IAM, development and automation skills enabled us to make the fundamental changes and automation necessary to meet the identity and access management requirements of this banking group in an efficient and rigorous manner. 

Our expertise in the management of fixed-price contracts (management by UO, KPI, SLA), our history of the context and our understanding of the challenges linked to the group’s strategy enable us to adapt the system and the associated missions in a continuous improvement approach, and to adapt to the client’s evolution and business requirements. 

We carry out all identity and access management for the client, from the definition and management of accounts and profiles (compliance, provisioning, etc.), to the control of access to the information system, On premise and IBM Cloud.

SAAM activity

  • Definition and implementation of a homogeneous and industrial solution for provisioning technical accounts on the customer’s ITC platforms 
  • Management of the profiles catalog, technical resources, segregation rules 
  • Support and follow-up of level 2 incidents related to the operation of SAAM products 
  • Audit of these provisioning actions
  • Follow-up of the conformity of the authorizations on the platforms 
  • Centralized management of user account password changes 
  • Management of accounts and passwords for individual accounts 
  • Definition and provision of personalized reports related to the activity 
  • Manage escalations of requests and incidents from N1 support or users for analysis and resolution

Access control and audit

  • Management of system security strategies 
  • Monitoring, auditing and compliance control of the security of supervised systems
  • Support and follow-up of level 2 incidents related to the operation of eTAC products 
  • Management of escalated requests and incidents from L1 support or users for analysis and resolution

dMZR activity (IBM Cloud)

  • Creation of generic email addresses used by IBM Accounts 
  • Hardening of IBM Accounts: Assignment of rights according to the matrices in place and compliance check
  • Provisioning of access to Accounts via the CA technology infrastructure and directly in the IBM CLOUD tool for Accounts not managed by the CA tool 
  • Management of access to dMZR training accounts 
  • Management of L1 and L2 incidents on IBM Cloud accesses 

Know-how

IAM

Wide range of skills around IAM/PAM, the main bulwark against cyber attacks

Automation

Automation/Robotisation of consolidation and verification acts

You may also be interested in