|RFx ID :||18826120|
|Tender Name :||Identity & Access Management Governance/Discovery Tool or Service|
|Reference # :||17-010|
|Open Date :||Tuesday, 11 July 2017 5:00 PM (Pacific/Auckland UTC+12:00)|
|Close Date :||Friday, 28 July 2017 4:00 PM (Pacific/Auckland UTC+12:00)|
|Department/Business Unit :||Learning Technologies Support|
|Tender Type :||Request for Proposals (RFP)|
|Tender Coverage :||Sole Agency [?]|
|Required Pre-qualifications :||None|
|Alternate Physical Delivery Address :|
|Alternate Physical Fax Number :|
The University of Canterbury is embarking on a large programme of work to replace its Identity and Access Management (IAM) Systems. Included in Stage One of the IAM programme is the requirement to conduct an extensive identity audit and analysis of all IT systems and associated business processes that provide or consume IAM services.
This ‘Governance and Discovery Analysis’, is a consultancy procurement that will:
• Provide a detailed analysis of the current data flows and IAM interactions between UC systems;
• Provide an analysis of existing permission and authorisation configuration, permission group memberships, entitlements and identifies ownership of resources and accesses;
• Provide a security / risk assessment with risk mitigation recommendations and other key information to allow consolidation and ‘housekeeping’ maintenance tasks to be completed in preparation for any transitional activity that may be required;
• Provide the ability to develop an Identity Persona against which security policies can be assessed, from both a business governance and technical perspective
• Provide key information to allow consolidation and ‘housekeeping’ maintenance tasks to be completed in preparation for any transitional activity that may be required;
• Provide key information that will inform the design of the core IAM Suite, ensuring it meets current and future requirements.
What we don’t want:
The programme is not expecting assistance with the new IAM system design or implementation in this procurement, other than specific recommendations provided as part of the security / risk assessment. The IAM design and implementation stages will follow this discovery stage.
What’s important to us:
The IAM Programme is looking for credible providers who have the capability, experience and utilities to deliver an analysis of this scale and complexity.
Why should you bid?
This is a unique opportunity to be part of a key stage in a major IAM replacement programme. A successful delivery of the initial analysis will provide a sound foundation for the future stages when the Core IAM suite will be designed, based on these findings and then implemented.