Security Strategy and Planning for a Large Mining Corporation

Identity and access management · IAM · SSO · Mining

The challenge

Our client, a large mining corporation, faced challenges in implementing an identity and access management solution. They needed to address the urgency and deployment plan for a complex technology stack—including PKI, SSO, Active Directory, and privileged identity management. With a scattered landscape of hundreds of applications utilising various protocols, the organisation lacked centralised administration and a future-proof infrastructure.

What we did

To address these challenges, we initiated a series of workshops to identify key blockers and ongoing initiatives within the organisation, as well as the motivation to proceed with the implementation. These workshops provided a platform for stakeholders to voice their concerns and share their thoughts on the proposed solution. Through these workshops, we gathered insights into the organisation's current pain points and better understood their requirements.

We also administered questionnaires to gather information on specific needs and expected outcomes. By profiling the target audience, we were able to tailor our language and presentation, making it more relevant and effective for the stakeholders.

Through a series of reviews and adjustments, we developed a detailed implementation plan—aligned with current industry best practices—to implement identity and access management (IAM) and Single Sign-On for their 700+ cloud and in-house developed applications. The report included a blueprint for the organisation's posture, estimated costs, effort, time, and required resources for deployment, as well as a future plan of action.

The report also included a comprehensive overview of the proposed solution—including the technology stack and the different components required—and outlined the different phases of the implementation process: assessment, design, deployment, and post-deployment. We included a detailed project plan with timelines and milestones to ensure the implementation was completed on time and within budget.

Clear, actionable IAM roadmap

Our engagement provided the client with a clear and actionable plan for the implementation of an identity and access management solution. By addressing their pain points, gathering their requirements, and profiling the target audience, we delivered a customised and effective solution that met their specific needs. Our detailed report and implementation plan gave them a clear roadmap for deployment and future maintenance, ensuring their organisation would be secure and future-proof.

Ready to plan your security strategy and IAM implementation?

Get in touch