Smart Survey 2 IAM Security Maturity Assessment Answer the following questions to receive a detailed IAM recommendation. Overall Security Maturity How would you rate your organization's overall security posture? Very Strong Strong Moderate Weak Very Weak Do you have a dedicated security team? Yes No How frequently do you conduct security audits? Quarterly Semi-Annually Annually Never Do you have an incident response plan in place? Yes No Are your employees trained on security best practices? Yes, regularly Yes, but not regularly No Next Identity Services (MFA, IGA, PAM) Do you use Multi-Factor Authentication (MFA) for all critical systems? Yes, for all systems Yes, for some systems No Do you have an Identity Governance and Administration (IGA) solution in place? Yes No Do you have a Privileged Access Management (PAM) solution in place? Yes No How do you manage user access to applications and data? How do you monitor and audit user access? Back Next Identity Processes Do you have a formal process for onboarding and offboarding users? Yes No How do you manage user access reviews? Automated Manual Ad-hoc None Do you have a process for managing changes to user access? Yes No How do you handle access requests? How do you ensure that users have the least privilege necessary to perform their jobs? Back Next Identity Controls Alignment Are your identity controls aligned with your business objectives? Yes Somewhat No Are your identity controls aligned with your regulatory requirements? Yes Somewhat No How do you measure the effectiveness of your identity controls? How do you ensure that your identity controls are consistently enforced? How do you adapt your identity controls to changes in your business or technology environment? Back View Results