Identity Maturity Assessment (IAM)
Our identity maturity assessment gives you a quantitative output of your risk against NIST and NCSC. We discuss your risk appetite and score it, from this we are able to design you a roadmap with discrete work packages.
The report can be presented at board level to communicate your risk.
Features
- Metrics against your status provide quantitative data.
- Identity maturity assessments
- Business-case-style presentation report
- Alignment with NIST CSF 2.0
- Alignment with NCSC
- Gap analysis
- Objectively and independently assist with discovery
- Clear roadmap divided into horizons and work packages
- Based on our unique model for scoring
- Analyses people, process and technology
Benefits
- Reduced cyber risk
- Defines a clear direction, saving time and money
- Secure cloud through effective IAM
- Take advantage of modern IAM technology
- Useful for tendering exercises, providing specific requirements
- Quickly identify and enforce IAM security policies
- Understand how you can secure your department
- Reduce IAM overhead
- Communicate the outcome easily to funding boards
- Improved compliance and governance
Pricing
£385 to £1,425 a unit a day
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
1 7 1 9 5 6 7 5 0 7 4 3 8 6 9
Contact
Innovate IT Ltd
Paul Rawlinson
Telephone: +44(0)1233 800 102
Email: Hello@Innovate.Cloud
Planning
- Planning service
- Yes
- How the planning service works
-
When assisting buyers with planning the implementation of cloud identity platforms, we start by understanding their people, processes and technology. Our unique identity maturity risk score tool enables us to identify high risk areas and plan mitigation strategies for the customer based on prioritising the highest risk. We provide a high level roadmap, related horizons to sign-post the way and discrete work packages.
Our implementation plans include clear timelines and milestones to ensure smooth execution. We provide ongoing support to overcome challenges and optimise performance, ensuring minimal disruption to operations. By partnering with us, buyers benefit from our expertise and commitment to delivering tailored solutions that drive business value and innovation. - Planning service works with specific services
- No
Training
- Training service provided
- No
Setup and migration
- Setup or migration service available
- Yes
- How the setup or migration service works
-
This service helps the Buyer understand what they need to do to securely migrate to cloud or between identity services. The gap analysis, roadmap and work packages lead the Buyer to a more secure cloud transition.
Innovate has experience of migrating identities between on-prem Microsoft Active Directory (AD) on-prem to cloud identity providers (Idp) as well as between different cloud identity providers. We thrive on simplifying the most complex or disparate processes.
We integrate applications with Idps that enable you to manage all your cloud services either from the cloud Idp, or from another source of truth.
We utilise a combination of migration tools and custom scripts to ensure the identities, and the required attributes, are migrated to the new cloud identity platforms intact.
We have experience in migrating single forests, single domains, complex resource and identity forest combinations and inter-cloud.
Once migrated, we can help with automating processes. - Setup or migration service is for specific cloud services
- No
Quality assurance and performance testing
- Quality assurance and performance testing service
- Yes
- How the quality assurance and performance testing works
-
Our deliverables are quality assured by our internal QA team to a set of company standards based on industry best practice.
We will also agree a set of QA deliverables with the Buyer to ensure service is delivered to a consistent high-quality set of baseline measurements that the you, and we, expect.
Security testing
- Security services
- Yes
- Security services type
-
- Security strategy
- Security risk management
- Security design
- Cyber security consultancy
- Security incident management
- Security audit services
- Other
- Other security services
- Identity security review (includes process and people)
Ongoing support
- Ongoing support service
- No
Service scope
- Service constraints
-
Support for this services is in good faith and is limited to up to 2 weeks beyond the delivery. Any questions on the outcomes should be directed to the key contact.
This service is purely consultancy and discovery, no changes, implementation, integration etc. are included in this service.
It is incumbent on the Buyer to fact check the documentation during the review, as any details we have been provided with that are incorrect will affect the outcome.
User support
- Email or online ticketing support
- No
- Phone support
- No
- Web chat support
- No
- Support levels
- Good faith, up to 2 weeks beyond delivery at no additional cost
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Baseline Personnel Security Standard (BPSS)
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- CARDAN Compliance Services
- ISO/IEC 27001 accreditation date
- 03/05/2024
- What the ISO/IEC 27001 doesn’t cover
-
Most controls relating to a physical place of work and software development are out of scope of our ISO 27001 accreditation.
Controls relating to physical security (place of work)
Physical security perimeters
Physical entry
Securing offices, rooms and facilities
Physical security monitoring (NEW)
Protecting against physical and environmental threats
Working in secure areas
Supporting utilities
Cabling security
Controls relating to software development
Secure development life cycle
Secure system architecture and engineering principles
Secure coding (NEW)
Security testing in development and acceptance
Outsourced development
Test information - ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- No
- Other security certifications
- Yes
- Any other security certifications
- ICO
Social Value
- Social Value
-
Social Value
- Fighting climate change
- Tackling economic inequality
- Equal opportunity
- Wellbeing
Fighting climate change
We measure our CO2 as part of our carbon reduction plan.
In collaboration with Carbon Footprints, we send trees to schools and communities, creating areas that are richer in plants and wildlife, whilst benefitting and educating local communities through school interaction. Every year, we ensure we offset more tCO2e that we use.
For each tree we donate, our tCO2e is also offset as part of a Verified Carbon Standard (VCS) scheme.
Our commitment supports the government’s plan for:
• creating or restoring 500,000 hectares of wildlife-rich habitat outside the protected site network, focusing on priority habitats as part of a wider set of land management changes providing extensive benefits
• increasing woodland in England in line with our aspiration of 12% cover by 2060: this would involve planting 180,000 hectares by end of 2042
• making sure that there are high quality, accessible, natural spaces close to where people live and work, particularly in urban areas, and encouraging more people to spend time in them to benefit their health and wellbeingTackling economic inequality
From PPN06/20
Social value - Theme 2 Tackling Economic Equality -
MAC 3.1 - we are a small (SME) business that uses a network of associates (often business sizes of 1-3 people) by choosing us, you are helping small organisations grow. We have a clear development path to take staff from apprenticeships to identity architects and beyond. Cybersecurity is an industry that is lacking in skills and resources.
MAC 3.3 - we provide scalable and future-proofed solutions, we deliver solutions that modernise the workforce.
MAC 3.5 - as cyber security specialists, we identify and manage cyber security risk, both our own and for the projects or support services we provide to the Buyer. We are Cyber Essentials certified and ISO 27001 certifiedEqual opportunity
We have a strong ethical remit, which is to offer the products and services that give the best value to the Buyer. This sense of ethics is the underpinning principle that links our network of suppliers and partners, regardless of their social and ethnic backgrounds and of different genders, sexual orientations, neurodiversity etc.
We have a clear development path to take staff from apprenticeships to identity architects and beyond. We are registered with the Apprenticeships Service.
Although we don't have to implement a modern slavery policy due to our size, we have nevertheless done so.Wellbeing
All staff have access to our combined Employee Assistance Programme and private healthcare package. Here they have access to physical and mental health support, as well as programmes to support them to increase their activity levels and stay healthy.
As our staff are remote workers, we run regular check-ins to build team work and ensure morale is maintained. When we are on a project, the team working on it will work closely with the Buyer's team, building lasting relationships that ultimately benefit one another.
Pricing
- Price
- £385 to £1,425 a unit a day
- Discount for educational organisations
- No