Skip to content
Search
ocg

ICAM and Zero Trust with with Microsoft Azure

Oxford Computer Group


Overview

Adversaries, whether nation-states, criminals, or thrill-seekers, are aggressively targeting government agencies for cyber-attacks to exfiltrate data or to disrupt critical operations.

A primary target for these attackers is Federal Identity, Credentials, and Access Management (ICAM) systems. Compromising these systems enables attackers to assume the identity of federal users and can allow unfettered access to government data and systems.

At the same time, the federal government is undertaking a massive transformation from on-premises to a cloud-first infrastructure. This transformation requires a radical change in how we view ICAM as it becomes the foundation for how we secure both cloud and on-premises data and applications. This solution guide intends to provide a roadmap to a widely accepted approach to a cloud-based identity model.

ICAM enables the right individual to access the right resource, at the right time, for the right reason.

Federal agencies must also comply with new requirements as they upgrade their ICAM requirements as they move to the cloud. Oxford Computer Group (OCG) partnered with Microsoft and Saviynt to build and provide the solution for an effective ICAM program that meets the criteria for a robust Zero Trust security solution.

Microsoft via Azure Active Directory provides the foundational Identity & Access Management (IAM) layer natively integrated with Azure Government Cloud to meet the appropriate compliance requirements. Saviynt natively integrates with AD to provide Identity Governance and Administration (IGA). OCG provides implementation services from discovery to deployment.

Why Choose Oxford Computer Group?

For nearly 20 years, we have specialized in Microsoft identity, security, and governance solutions. We have an excellent track record, having won the Microsoft Partner of the Year award eight times and been Saviynt’s Impact Partner of the Year twice. In 2023, we were named a finalist for the MISA (Microsoft Intelligent Security Association) Zero Trust Champion award.

We design and develop innovative solutions focused on delivering business value. We assess architectures and processes, and make recommendations designed to support strategic objectives. To accelerate deployment, we use our proven methodology, best practices, and a unique library of code developed during 1000+ projects.

Zero Trust Mindset

Assume that you have already been breached and that all access requests are hostile. This requires continually evaluating access requests to ensure they are valid.

Single Identity Repository

Leverage a single, enterprise-wide identity repository for access across your on-premises and multi-vendor cloud environments. This enables a comprehensive set of access controls across all users and a single view of user entitlements and activities. Organizations that already have Microsoft 365 should leverage Azure Active Directory (Azure AD) as the single identity repository. All enterprises (including federal agencies) should embrace Microsoft’s Hybrid approach leveraging Azure AD as the single identity repository in the cloud

Least Privilege

Microsoft 365 and Saviynt provide the governance tools, including conditional access and Privileged Identity Management (PIM), to properly enforce and manage the principles of least privilege.

Multi-Factor Authentication (MFA)

Multi-Factor Authentication should be used by anyone with access to your applications or data. MFA doesn’t always have to be via a phone or token but could leverage Windows Hello to ensure a better user experience

Risk-Based Analytics

Leveraging the single identity repository to perform risk-based identity analytics will enable organizations to focus security, compliance and management efforts on the identities that pose the most risk to the organization. Risk-based analytics will also allow for streamlining processes to improve the user experience and allow administrators to quickly identify security signals such as risky user sign-ins - all while reducing costs.

Conditional Access

Leverage Conditional Access policies based on risk-based analytics to limit access. For instance, users with a managed device would get access in accordance with their entitlements, but an unmanaged device may get read-only access. Users coming from abnormal locations may have their access limited or require an additional factor to authenticate.

Download the full solution brief here


Features

Please contact the provider for more details.
 

Support

Please contact the Provider for Support related information.


Provider Information 

Oxford Computer Group (OCG) is known for specializing in identity and security solutions, primarily focused on identity governance, digital identity, and access management. They help organizations manage and secure user identities, credentials, and access rights across on-premises and cloud-based services. OCG might offer services ranging from consulting and strategy to implementation and support for identity management solutions.

OCG is recognized for its expertise with Microsoft technologies, such as Azure Active Directory and Microsoft Identity Manager. They have provided solutions to a variety of sectors including education, government, healthcare, and more.

Visit Oxford Computer Group for more information about the provider.


Pricing

Contact Us

Details
Published by OCG

Support

Solution Type Product Accelerators
Category Advise
Pricing Contact Us

Ready to see for yourself?

Request a personalized demo with a Savint identity expert